ENITSE Enterprise IT Security Conference & Exhibition will be held on 04-05 November 2015 in Istanbul – Turkey. ENITSE is…
Browsing: Identity and access management (IAM)
In response to the recent survey from LogRhythm*, I find it shocking that almost half of organisations that have suffered…
Cyber London, Europe’s first dedicated cyber security accelerator programme, today held its first ‘Demo Day’ in Hammersmith, London. Founders of…
Damballa, the experts in advanced threat protection and containment, today released its Q2 2015 State of Infections Report, highlighting how…
Mobile Gaming Applications Hit Hardest, With Close to 2 Million Unauthorised Releases Expected in 2015 Arxan Technologies, the leading provider…
New Virtual f(n) Delivers Router and Firewall Capabilities Entirely in Software Masergy Communications Inc., a global leader in secure networking…
Carmine Clementelli of PFU, a Fujitsu company, commented this afternoon on a new report from Trend Micro that North American…
Hackers’ increasing sophistication means perimeter security is failing. Organisations must switch tactics and turn to tools which can stop intruders…
Mobile apps have been increasingly gaining ground in the communication industry. Enterprises are rapidly adopting innovative mobile applications to transform…
Richard Blech, CEO & Co-Founder, Secure Channels, on today’s news that a CIA-backed tech company found on the Web logins and passwords connected…