Security is a major concern as BYOD increases. We’re all familiar with the problems arising from data stored on unsecured devices which then go missing, but what about unsecured network access?
Browsing: Identity and access management (IAM)
As the desire for business agility increases, companies are bypassing security teams and processes to set up risky IT infrastructures in the cloud
BYOD becomes a bit more complicated when you work in an environment that requires stronger forms of authentication than a username and password combination.
A decade ago, almost no one used online backup services to store their data in the cloud. Yet, as smartphones become ubiquitous, the need to synchronize data among multiple devices has boosted the use of cloud backups
Eric Schmidt, Google’s executive chairman, put a question to an audience Gartner’s Symposium ITxpo here on Monday. “Raise [your] hand if you’re sure the Chinese are not inside your corporate network.”
London, UK (7 October 2013) – According to DOSarrest Internet Security, findings by its Vulnerability Testing and Optimisation service (VTO) of deep website scans, ninety percent of websites are vulnerable to attack.
Business is increasingly taking place outside the corporate firewall. Employees are using their own devices and turning to consumer-grade cloud file sharing services to allow for access across multiple devices
In an important customer announcement published yesterday, Adobe notified customers that its network had been breached, and the attackers illegally accessed information relating to 2.9 million Adobe customers
Adobe late today revealed that it recently discovered that it had suffered massive “sophisticated attacks” on its network that resulted in the theft of sensitive information including payment card information on 2.9 million customers
IDaaS Pioneer is Assigned Patent 8,510,794 for Innovations Relating to SCUID Lifecycle’s User Interface, Recommendation Engine, and Proxy Architecture.