As the undisputed global leader in technological innovation, it has always been shocking to me that Silicon Valley doesn’t lead…
Browsing: Identity and Access Management (IAM)
Websense® Security Labs™ researchers observed that ransomware was a plague in 2014 and this threat type shows no sign of…
As we work more frequently on the road, our mobile devices are fast becoming the first tool we turn to.…
“There are only two kinds of companies. Those that were hacked and those that don’t yet know they were hacked.”…
In Software Defined Network (SDN) architecture, the control plane is separated from the data plane and implemented in a software…
As we kick off 2015, I predict that this will go down in history as the year of the Threat…
Many companies feel overwhelmed with the burden of covering all aspects of IT security, since growing network structures and factors…
There’s no question that the Box IPO has validated the market demand for simple ways to share and collaborate on…
Many of the most popular games out today are those that include, and heavily rely on, a multiplayer aspect.
David Fisk of Quorum relates how an organisation’s CryptoWall intrusion could have been different had instant recovery technology been in place.