The proportion of spam in email traffic continues to fall – in the last three years the share of unsolicited messages has fallen by 10.7 percentage points.
Browsing: Identity and access management (IAM)
Great information security is about risk analysis and mitigation and the irony is that sometimes the best way to keep your information secure is…
One website that causes concern is Foursquare, a location-based social networking app designed specifically for smartphone and mobile device use.
For network engineers the greatest stress is all the new technology that members of staff bring in to connect to the company’s network in January
Snapchat, one of the most popular mobile apps amongst teenage girls, can teach CIOs a thing or three about technology and communication.
The Veteran Affairs E-Benefits website was shut down temporarily last week after VA security employees detected a data breach in the site’s code.
Nowhere is the impact of this confusion and concern more apparent than in the case of digital comms such as emails, text messages and social media posts.
As the Target data breach seems to grow more damaging by the day, there’s a lot of talk about what the repercussions will be for Target & its customers.
On 8th April 2014 Microsoft will end mainstream support for Windows XP. With over 20% of Windows PCs still running XP this is a significant event.
Aoratos approach is on Microsoft’s Active Directory services activities by observing the network traffic between AD servers and the active network entities