Venafi, the leading provider of Next-Generation Trust Protection, today announced new research reevaluating the risk of attacks that exploit incomplete…
Browsing: Identity and access management (IAM)
More and more organisations deploy their own private cloud to increase data security, flexibility and efficiency. For years, technology evangelists have…
Richard Blech and Philip Lieberman commented on news from IBM , in which senior threat researcher John Kuhn blogged that…
TK Keanini, CTO of Lancope, had the following reaction to the new CompTIA security readiness study.
Considering the opinion of Martha Lane Fox who has called upon the UK to lead the way by setting up…
Brendan Rizzo, technical director for HP Security Voltage (www.voltage.com) issued the following commentary on the hack of British Airways frequent…
Passwords. For all the talk about two-factor and multi-factor authentication, to mainstream adoption of biometrics, passwords are not going away.
Symantec has reported that an older vulnerability is still being exploited through new malware they call Trojan.Laziok. targeting the energy…
Undisputed messaging market leader incorporates leading secure messaging solution to meet user demand for privacy and protection for Openwave’s 400…
The proliferation of data flowing outside of corporate firewalls is creating a security conundrum.