Corporate boards need to get off the dime and fund their IT security departments with the tools to stop “identity,” i.e. root-based, attacks.
Browsing: Identity and Access Management (IAM)
Identity theft is a serious concern against which all online users need some kind of protection.
DX has released new research that shows 57% of legal professionals in the UK believe email constitutes the greatest security risk to their business.
Allan Pratt weighs in on the benefits and risks associated with using cloud applications.
While there has been much talk about how Apple Pay might disrupt the payment system, and how easy it will be to use, its security is being overlooked.
McAfee has launched a new report predicting how the next generation of government might look and what the future security challenges might be.
More than 110 million pieces of personal information have been traded online already in 2014.
While there are no guaranteed solutions at the moment, there are a number of steps you can take to increase your network security in Shellshock’s aftermath.
Incapsula’s researchers compare Shellshock and POODLE, two of the largest vulnerabilities discovered since Heartbleed.
Lori MacVittie recommends that we can determine the benefits and risks of cloud applications by evaluating them on an individual application basis.