The largest HIPAA breach settlement this year cost a hospital and university $4.8 million in government-mandated fees.
Browsing: Identity and Access Management (IAM)
Recently, Websense discovered that the website of Popular Science had been compromised and served malicious code.
Michael Slabodnick of SysAid Technologies feels Windows 10 could help transition large user communities into the tablet-toting workforce.
As IT budgets are likely to remain flat for the near term, CIOs will continue to look for ways to make the organization run more efficiently.
With the consumerisation of IT continuing to gather pace across businesses of all sizes, technology in 2015 will need adapt to keep up with this trend.
Ilia Kolochenko, CEO of High-Tech Bridge, discusses how any website, even a personal blog, can be sold on the black market.
Intralinks recently published new research with the Ponemon Institute into the security threats and data loss caused by unsanctioned file sharing.
Phil Beckett, partner at Proven Legal Technologies, considers the rise in cyber security threats and what firms must do to protect themselves.
The internet is a vast, unregulated space where e-criminals are able to promote and sell imitation goods on an immense global scale.
Before migrating a database to the cloud, it is critical to understand the scope of this action, including what data should be moved where.