BYOD becomes a bit more complicated when you work in an environment that requires stronger forms of authentication than a username and password combination.
Browsing: Identity and Access Management (IAM)
A decade ago, almost no one used online backup services to store their data in the cloud. Yet, as smartphones become ubiquitous, the need to synchronize data among multiple devices has boosted the use of cloud backups
Eric Schmidt, Google’s executive chairman, put a question to an audience Gartner’s Symposium ITxpo here on Monday. “Raise [your] hand if you’re sure the Chinese are not inside your corporate network.”
London, UK (7 October 2013) – According to DOSarrest Internet Security, findings by its Vulnerability Testing and Optimisation service (VTO) of deep website scans, ninety percent of websites are vulnerable to attack.
Business is increasingly taking place outside the corporate firewall. Employees are using their own devices and turning to consumer-grade cloud file sharing services to allow for access across multiple devices
In an important customer announcement published yesterday, Adobe notified customers that its network had been breached, and the attackers illegally accessed information relating to 2.9 million Adobe customers
Adobe late today revealed that it recently discovered that it had suffered massive “sophisticated attacks” on its network that resulted in the theft of sensitive information including payment card information on 2.9 million customers
IDaaS Pioneer is Assigned Patent 8,510,794 for Innovations Relating to SCUID Lifecycle’s User Interface, Recommendation Engine, and Proxy Architecture.
A study from Tripwire and the Ponemon Institute has revealed that many of the world’s largest enterprises are not prepared for the new European Union Directive on cyber security
Experian CreditExpert’s survey of 2,033 users found that while 73% claimed to be tech literate, many were failing to take precautions to protect their smartphones and tablets.