Intralinks recently published new research with the Ponemon Institute into the security threats and data loss caused by unsanctioned file sharing.
Browsing: Identity and access management (IAM)
Phil Beckett, partner at Proven Legal Technologies, considers the rise in cyber security threats and what firms must do to protect themselves.
The internet is a vast, unregulated space where e-criminals are able to promote and sell imitation goods on an immense global scale.
Before migrating a database to the cloud, it is critical to understand the scope of this action, including what data should be moved where.
Recently, Corero Network Security identified a change in the way attackers are using DDoS as a mechanism to target their victims’ networks.
AlienVault Labs has been tracking a cyber espionage group from Russia for years. Here’s what we know about it.
According to a survey carried out jointly by B2B International and Kaspersky Lab, 13 percent of Internet users do not believe that cyber threats are real.
NeoMam Studios reveals that many IT pros are either unaware of the threats to cloud security or are not taking sufficient action to minimise them.
Local fingerprint biometrics such as Touch ID Fingerprint stands to increase security and convenience. But could it replace the password?
There are many reasons businesses need to protect themselves from a possible data breach via third-party data recovery providers.