The Roer Group is now accepting students for its Security Culture Summer Camp 2015!
Browsing: Identity and access management (IAM)
Experts from Portland, OR-based Tripwire (www.tripwire.com), provider of advanced cybersecurity threat solutions, commented on the FCC’s announcement that AT&T has…
New report examines eight trends that pose significant data theft risks for organisations Websense, Inc. a global leader in protecting…
Making the most of information is a priority for business leaders everywhere, but achieving this goal is be difficult. Just…
Prototype with Windows 10 NFC capability to be demonstrated at the RSA Conference in San Francisco on 20-24th April 2015
In order to develop a rational approach to nation-state hacking, it’s important to understand the background and change the way…
Akamai, Cisco, Electronic Frontier Foundation, Mozilla and others aim to provide free, easy way to protect our online lives with…
CNN reported that Russia was behind last year’s State Department and White House hacks.
How does group policy work? Group policy is Microsoft’s core infrastructure for managing the configuration of both users and computers…
Vulnerabilities a Pathway for Robbery, Theft of Sensitive Information or Stalking Veracode, a leader in protecting enterprises from today’s pervasive…