News Highlights: Industry’s first One-2-One visual security solution to easily and readily identify legitimacy of card holder. Enables universities, enterprises…
Browsing: Identity and Access Management (IAM)
The UK’s SMEs are increasingly using Voice over Internet Protocol (VoIP) in order to cut call costs. Alongside cloud computing,…
The U.S. Department of Justice recently released a manual with best practices for victims of cyberattacks. The guidelines are aimed at…
Krebs points out the potential initial culprit in gaining credentials to access the CareFirst network and data may have been…
Adult Friend Finder, a casual dating website, has called in police and investigators after a suspected leak of client information as…
Two factor authentication through existing physical smart cards or on-device credentials protects multiple business-critical apps Cybersecurity expert Intercede today announced…
Attending conferences and trade shows is a luxury many of us cannot afford, both from the time and expense perspectives.…
As Chrome continues to eat the marketshare of browsers, the security and privacy implications of Chrome extensions will become even…
Cybersecurity experts from HP Security Voltage, Lancope, Tripwire and Secure Channels commented on news of a breach at healthcare provider…
What you can learn from the Holborn outage – don’t let lack of IT planning get in the way of…