A third of IT security professionals do not keep corporate data in the cloud because of fear of government snooping
Browsing: Identity and access management (IAM)
Following the news that Basecamp was hit by an extortion based DDoS attack, there are three comments below from security experts.
PandaLabs today released a warning of a malicious spam campaign making use of a story on the reputable BBC website to add credence to the phishing attempt.
Ping Identity®, The Identity Security Company™, has announced it has acquired accells technologies, a pioneer in context-based mobile authentication.
Kaspersky Lab have revealed its Spam analysis for February 2014. It found that many malicious attachments in February’s spam came in emails
From a private perspective, as a user of the Internet in today´s Internet of Things, Windows XP will remain a security and privacy nightmare.
The financial impact, particularly, to a business that experiences a data breach can be significant as it directly affects consumer confidence.
Do you have positive control over where you data and information have been? Is your data and information exposed to dark territories?
Today’s static groups are an essential building block in most policies used to “authorize” access to application resources.
Digitised documents can be subjected to modern data analysis techniques, or investigated alongside digital records, revealing things that could take years