Security management and compliance company, RandomStorm, is speaking at InfoSec Europe, which takes place at Earls Court, London on 29th and 30th April.
Browsing: Identity and Access Management (IAM)
So, how do the seven deadly sins manifest themselves in IT security? More easily than you might think. Let’s take a look.
Centrify Corporation have announced the results of an industry study conducted by Osterman Research
Today’s NAC solutions are capable of providing appropriate access to network resources based on the identity of the device, functionality and state.
McAfee report highlights how money laundering through online gambling sites helps cybercriminals hit the jackpot
From all of the security controls an organization could deploy, which one do you feel adds the most actual value for day-to-day info security and why?
The program that contained the Heartbleed bug did exactly that and an attempt to prove that it didn’t would have quickly found this bug
SIX and Tufin Technologies have emphasized the need for companies to significantly improve network change and application delivery
What security control provides the most real security and applies to both on-premises and cloud resources? Two-factor authentication.
A study by Cryptzone, conducted amongst attendees at last month’s Microsoft’s SharePoint Conference in Las Vegas (USA)