FireLayers have announced its flagship solution the first of a series for enabling the secure and responsible adoption of cloud applications.
Browsing: Identity and access management (IAM)
A look at a brief history of computer security threats shows the evolution of cyber risks and hazards.
Suzan Mustafa discusses phishing emails, the most common examples of this type of attack, and what you and your business can do to protect against them.
Time Magazine lists the five cybercrime hotspots of the world
Wherever we go, we find WiFi hotspots to help us stay connected to our very own ‘digital lives’. However, we hardly stop and think about our WiFi security
Wearables – smartwatches and miniature electronic devices like Google Glass – are the new class of personal connected devices
A recent study commissioned by Netskope reveals most businesses feel cloud providers fail to comply with data protection laws and regulations.
Daren Glenister of Intralinks has compiled a list of data security tips for on-the-go.
When it comes to cloud computing in the age of HIPAA Compliance, encryption has become the accepted best practice.
Kaspersky calls on business and IT security leaders to unite as firm’s research exposes vulnerability of connected vehicles