Integrated Offering Enables Joint Customers to Centrally Manage Provisioning of Corporate Assets and Application Access with full Governance, Security, and Efficiency
Browsing: Identity and Access Management (IAM)
To developers, advertising frameworks may just be another way to make money from their free application, but in at least one case–dubbed “Vulna” by security firm FireEye
Wickr was one of the most interesting companies I was introduced to at this year’s RSA Conference in San Francisco. The company was one of the finalists of the Innovation Sandbox
Phil Schacter, managing VP, Gartner recently guest-hosted a Tufin webinar which talked about how complexity and change are affecting enterprises far more today than ever before.
Social engineering has for a while now been cyber attackers’ best bet to enter systems and compromise accounts when actual hacking doesn’t work, or when they simply don’t want to waste much time getting in.
A young security researcher has developed the first ever malware designed to target the recently released Firefox Mobile operating system and plans to unveil the proof-of-concept at the at the upcoming The Ground Zero (G0S) 2013 security summit in November.
To support the start of the UK’s “Get Safe Online Week”, part of Cyber Security Awareness Month, GlobalSign is publishing some useful information to benefit today’s ever increasing online consumer community.
Lancope Presents Webinar on Safeguarding patient information and Defending Healthcare Networks with NetFlow
NSA whistleblower Edward Snowden has claimed he taught a course in “cyber-counterintelligence” against China and has access to data on every active operation mounted against the People’s Republic by the US spy agency.
Anti-Virus (AV) software, along with its Firewall side-kick, has been the standard weapon against Internet borne threat for the past two decades. But in a changing threat landscape AV is fast beginning to look past its sell-by date.