Perhaps taking a step back and looking at history may provide some answers. In trying to make sense of the past, we can divide the evolution of computing
Browsing: Identity and access management (IAM)
From our overall economy to an individuals social activities, we are heavily reliant on the Internet, cloud computing and data centres.
DatAnywhere 1.5, adding to the functionality of a secure collaboration solution that has gained strong customer adoption in its first year of existence.
Lieberman Software Corporation announced that its privileged identity management (PIM) product, Enterprise Random Password Manager
With less than a month remaining before 2014, Panda Security announced its predictions for top security trends to watch for in the coming year
I would like to share 5 resolutions that should not only be part of a list for the New Year but should be part of a regular security awareness plan.
Journalists are deploying SecureDrop en mass, from Forbes, New Yorker to Wired. As a result we will begin to see more and broader leaks worldwide.
Lenovo is working with Nok Nok Labs to develop a joint solution to the ongoing problems created by the reliance on weak or complex passwords.
Cisco Veteran Joins Big Switch Networks to Lead Engineering, Accelerating Software-Defined Networking (SDN) for Next Generation Fabrics
Nowadays, illegal online activities such as Phishing and Typosquatting are growing at an alarming rate.