Richard Hibbert of SureCloud reveals that a change of approach can help cast compliance in a more positive light than it is now.
Browsing: Identity and Access Management (IAM)
Data-centric security strategies are becoming the de rigueur thinking among thought leaders in information security.
Professor John Walker comments on a recent security incident in which the Nottinghamshire Police web site was defaced by AnonGhost.
Cloud Security Alliance (CSA) announces the findings of its recent survey on Shadow IT entitled Cloud Adoption, Practices and Priorities Survey Report
Toby Scott-Jackson of SureCloud has listed the top vulnerabilities to look out for that could pose a serious barrier to PCI compliance for call centres.
Wolfgang Kandek, CTO of Qualys, Inc., comments on the Patch Tuesday for January of 2015.
An infographic explains how the weak points of the internet can be exploited and details who keeps us safe online and how they do it.
Many SMBs are looking to managed security service providers (MSSPs) to help navigate the right approach to security solutions and practices.
The developers of codeREADr have announced the launch of auto-sync technology for offline ticket validation at events that will help tackle e-ticket fraud.
David Emm, Senior Security Researcher at Kaspersky Lab, discusses the recently disclosed Moonpig vulnerability.