Security expert Mark Stanislav discusses the delicate balance of focus and tact that companies need to build a positive security culture.
Browsing: Identity and Access Management (IAM)
Safelight Security offers a look at a few techniques most commonly used among attackers to steal people’s passwords.
Intercede has found that consumers are leaving back doors open to hackers when they sign up for automatic login on mobile apps or when they share PIN codes.
Given the prevalence of mobile devices in the workplace, businesses should institute a BYOD policy that does not expose them to additional risks.
John Walker comments on common user behavior with respect to mobile devices and suggests that these tools deserve more respect and security awareness.
According to a new study by Iron Mountain, 46 per cent of IT teams will insist on keeping data close at hand on hardware they can see, touch and control.
Career Academy is offering our readers exclusive access to their InfoSec and IT Certification Training All Access Pass. This is a limited time offer, so act now!
By taking stock of their human and technological resources, security teams can determine if they are prepared to effectively respond to APTs.
Lucas Zaichkowsky, Enterprise Defence Architect at AccessData, comments on the CHS hack that compromised 4.5 million patients’ data.
Blake Brannon of AirWatch by VMware has compiled five tips to help companies successfully implement a BYOD strategy.