This is where Honey Encryption comes in. As an added layer of protection, the scientists have proposed linking a password system to a honeychecker.
Browsing: Identity and Access Management (IAM)
By developing Encrypted Content Search in our Secured eCollaboration solution, we get around this deficiency, without compromising security
2014 will be the year of security analytics. This is my prediction based not on the hype of tech suppliers but a genuine pent-up demand from the market
Following the news that the NSA and GCHQ have been using Smartphone apps, such as Angry Birds, to collect users’ information
There has never been a more perilous time to be an employee actively using social media in the UK.
of course mobile working and BYOD increase the risk of data loss, as staff connect various devices to the corporate network
The proportion of spam in email traffic continues to fall – in the last three years the share of unsolicited messages has fallen by 10.7 percentage points.
Great information security is about risk analysis and mitigation and the irony is that sometimes the best way to keep your information secure is…
One website that causes concern is Foursquare, a location-based social networking app designed specifically for smartphone and mobile device use.
For network engineers the greatest stress is all the new technology that members of staff bring in to connect to the company’s network in January