IRM is a technology every organization should be evaluating now—preferably before the next big breach hits the headlines.
Browsing: Identity and access management (IAM)
Businesses’ increasing reliance on virtualisation has moved the issue of securing virtualised environments higher up on their agenda.
Ability to compromise internet-connected devices raises more questions about IoT security
Yonni Shelmerdine of Lacoon considers the potential threats and the methods of mitigation when employing VDI solutions.
Suzan Mustafa discusses the evolution of mobile fraud and suggests how users can avoid becoming victims of mobile scams.
Netwrix helps London hospital to improve security of 10,000-plus user network and provide full visibility of who is making changes, when and where.
With all support for Windows Server 2003 slated to end 15th July 2015, companies must act swiftly to begin migrating to Sever 2012.
Researchers at Incapsula have noticed Ukrainian SEO startup Semalt running a crawler using a botnet generated by malware.
As BYOD uptake continues to accelerate, companies must implement policies to handle security and privacy concerns before it’s too late.
Here’s a list of physical security “Dos” and “Don’ts” to keep in mind while at work: