With all of the NSA, RSA privacy concerns in the news tied to if your computer systems or networks can be eves-dropped, what about your data storage?
Browsing: Identity and access management (IAM)
A new research report issued by Bloxx has found that 68% of the UK’s education organisations are facing an ongoing battle with anonymous proxies.
There is such a thing as a successful enterprise BYO program and it doesn’t take a Christmas miracle to get it implemented!
As I’ve done more and more social engineering, it’s become more and more clear to me that the basics of security awareness aren’t sinking in.
As the evening wore on, I suddenly started to wonder about “whistle blowers”. After all we live in a culture that puts the whistle blower on a pedestal.
Following the news that Target announced regarding it´s recent data breach affecting 110 million customers, here are some thoughts from security experts
We. All of us. Are the the last lines of defense against Spear/Whale Phishing.
Security policy and awareness are often lumped together and usually perceived as Awareness training on company policies.
At the forefront of this evolution is Cloudyn´s new platform which enables SIs and Cloud Resellers to create a new revenue stream and increase profit margin
Carleton University in Canada have developed a ‘narrative authentication’ system that could put an end to the need to remember complex passwords