As the evening wore on, I suddenly started to wonder about “whistle blowers”. After all we live in a culture that puts the whistle blower on a pedestal.
Browsing: Identity and Access Management (IAM)
Following the news that Target announced regarding it´s recent data breach affecting 110 million customers, here are some thoughts from security experts
We. All of us. Are the the last lines of defense against Spear/Whale Phishing.
Security policy and awareness are often lumped together and usually perceived as Awareness training on company policies.
At the forefront of this evolution is Cloudyn´s new platform which enables SIs and Cloud Resellers to create a new revenue stream and increase profit margin
Carleton University in Canada have developed a ‘narrative authentication’ system that could put an end to the need to remember complex passwords
Lancope, announces that its director of security research, Tom Cross, has been named a Ponemon Institute Distinguished Fellow.
While IAM solutions are increasing their capabilities to manage cloud accounts, cloud providers are also creating APIs to allow for direct access management.
New AlienVault Threat Alerts provides IT profs with real-time, actionable information from the world’s largest crowd-sourced threat intelligence database
He says, “It is a primitive civilization that cannot follow even its own rules.” This is where we seem to be.