One such example is to take a straw poll to understand the number of IP connected devices those in the audience have at home, for the record the most anyone has ever answered is 71 (you know who you are!).
Browsing: Identity and access management (IAM)
By combining our best-of-breed privileged identity access control with Securonix’ advanced risk and threat analytics, we deliver real value
Who will get swept away and who will discover new lands? Here’s what’s happening in IAM these days and why federating the identity layer
The landscape is no longer just about “keeping the bad guys out”, but more about “catching the bad guys quickly when they’re in”, and learning from it.
Organizations will see more and more business benefits of information security which will, of course, make information security projects easier.
In response to the news that Yahoo has announced plans to encrypt all internal traffic following the National Security Agency disclosures by Edward Snowden
Shadow IT, the latest phrase for the informal layer of IT built and used inside your organisation that you have almost no control over.
Information Security, over the next two years will be shaped by a natural progression from Big Data to Deep Data and an ever-increasing focus by governments on Cyber Security.
Under a project codenamed MUSCULAR, the NSA sought to work around the restrictions of PRISM, another NSA info-sharing program
Unique FIPS certified and PIN activated USB flash drive datAshur recognised for robust security at the 2013 BCS & Computing UK IT Industry Awards London