Snapchat, one of the most popular mobile apps amongst teenage girls, can teach CIOs a thing or three about technology and communication.
Browsing: Identity and Access Management (IAM)
The Veteran Affairs E-Benefits website was shut down temporarily last week after VA security employees detected a data breach in the site’s code.
Nowhere is the impact of this confusion and concern more apparent than in the case of digital comms such as emails, text messages and social media posts.
As the Target data breach seems to grow more damaging by the day, there’s a lot of talk about what the repercussions will be for Target & its customers.
On 8th April 2014 Microsoft will end mainstream support for Windows XP. With over 20% of Windows PCs still running XP this is a significant event.
Aoratos approach is on Microsoft’s Active Directory services activities by observing the network traffic between AD servers and the active network entities
With all of the NSA, RSA privacy concerns in the news tied to if your computer systems or networks can be eves-dropped, what about your data storage?
A new research report issued by Bloxx has found that 68% of the UK’s education organisations are facing an ongoing battle with anonymous proxies.
There is such a thing as a successful enterprise BYO program and it doesn’t take a Christmas miracle to get it implemented!
As I’ve done more and more social engineering, it’s become more and more clear to me that the basics of security awareness aren’t sinking in.