In IT Security we always hear about the importance of time. How frequently can we update our virus database, how…
Browsing: Identity and access management (IAM)
Date: Wednesday, March 11, 2015 Time: 10 am PST / 1 pm EST
Our phones are our lives. Although most of us don’t want to admit it, for almost all of us it’s…
Almost half of the UK population would not sell their online data[1] for less than £1m, according to a landmark new…
AVG Technologies N.V. (NYSE: AVG), the online security company for 197 million active users, announced the immediate availability of AVG…
As the undisputed global leader in technological innovation, it has always been shocking to me that Silicon Valley doesn’t lead…
Websense® Security Labs™ researchers observed that ransomware was a plague in 2014 and this threat type shows no sign of…
As we work more frequently on the road, our mobile devices are fast becoming the first tool we turn to.…
“There are only two kinds of companies. Those that were hacked and those that don’t yet know they were hacked.”…
In Software Defined Network (SDN) architecture, the control plane is separated from the data plane and implemented in a software…