Incapsula has released a new playbook that teaches you how to prepare for a DDoS attack, what to do if one hits, and how to ultimately respond to it.
Browsing: Identity and access management (IAM)
A cyber security expert has told a House of Lords committee that a basic understanding of cyber security among all company employees is critical.
A European study by information storage and management company Iron Mountain has discovered an unexpected downside to advanced data back-up and storage capability.
A new survey reveals 78 percent of IT security professionals are confident that firewalls and anti-malware tools are robust enough to combat today’s APTs.
According to a global survey of IT pros, 27 percent of all businesses have lost sensitive business data due to internal IT threats in the past year.
Sarah Clarke digs deep into the many risks associated with our use of the cloud.
The use of advanced, secure file-sharing solutions offers a great way to assure data security for BYOD users and their employers.
Philip Lieberman of Lieberman Software reveals the myth that “detect and respond” technologies are “silver bullet” security solutions.
HP has unveiled the results from a new study on the importance of senior executive involvement in a breach response plan.
Vox Mobile has prepared a list of tips that can help you develop an effective BYOD strategy.