According to a global survey of IT pros, 27 percent of all businesses have lost sensitive business data due to internal IT threats in the past year.
Browsing: Identity and Access Management (IAM)
Sarah Clarke digs deep into the many risks associated with our use of the cloud.
The use of advanced, secure file-sharing solutions offers a great way to assure data security for BYOD users and their employers.
Philip Lieberman of Lieberman Software reveals the myth that “detect and respond” technologies are “silver bullet” security solutions.
HP has unveiled the results from a new study on the importance of senior executive involvement in a breach response plan.
Vox Mobile has prepared a list of tips that can help you develop an effective BYOD strategy.
Charles Sweeney reflects on some companies’ hesitance to move to the cloud.
Acumin provides some basic information about Shellshock, including what users should do to protect themselves.
David Emm, principal security researcher at Kaspersky Lab, comments on Twitter’s new “Digits” feature.
Intercede in its latest research has found that the security of corporate data across the UK is being compromised by workers’ ignorance of BYOD policies.