Trey Ford of Rapid7 comments on the recent news that hackers reprogrammed a widget on Forbes’ website to infect readers with malware.
Browsing: Identity and access management (IAM)
The e-Learning industry was worth $56.2 billion dollars in 2014 and is poised to double by 2015 according to elearningindustry.com.
Garrett Gross of AlienVault discusses how it is important to think carefully when considering whether or not to allow the use of Tor on your network.
When employees first began bringing personal devices to the workplace to use on the job, IT professionals had to make…
A look at the top cyber security incidents of 2014 indicates that more robust cyber security responses on the part of businesses and governments are needed.
Daniel Ingevaldson of Easy Solutions explains what happens to people’s data following a data breach, such as the recent Anthem hack.
Michael Hall of DriveSavers provides a list of steps customers should take to protect themselves from a data breach.
Experts in the information security industry comment on the recent data breach at Anthem, America’s second largest health insurer.
In order to encourage employees to use a secure file-sharing option, IT teams must implement a solution that’s even easier than a public cloud service.
Jack Marsal of ForeScout Technologies discusses how network access control (NAC) can help companies better protect against breaches and other attacks.