As we kick off 2015, I predict that this will go down in history as the year of the Threat…
Browsing: Identity and access management (IAM)
Many companies feel overwhelmed with the burden of covering all aspects of IT security, since growing network structures and factors…
There’s no question that the Box IPO has validated the market demand for simple ways to share and collaborate on…
Many of the most popular games out today are those that include, and heavily rely on, a multiplayer aspect.
David Fisk of Quorum relates how an organisation’s CryptoWall intrusion could have been different had instant recovery technology been in place.
Centrify Corporation, the leader in unified identity management across cloud, mobile and data centre, today announced the industry’s first privileged identity management…
A global study of almost 2,100 contracts covering deals worth £7.8 billion suggests that Cloud-based services are failing to capture…
Following the news that RBS is to use fingerprint recognition technology in its mobile application.
Recent independent research[1] commissioned by Ping Identity®, the Identity Security Company™, has revealed the disconnect between perception and reality when it…
It’s important to protect ourselves, our identity and also our files. So what can we do with sensitive data once…