At the time of writing I’m not sure if Edward Snowden is still sitting in a Moscow transfer lounge or settling in to his “luxury apartment” in a barrio in Venezuela.
Browsing: Identity and access management (IAM)
As organizations increase their mobility, more IT services are being moved into cloud applications. This can help increase accessibility, but it can also expose your critical data to potential threats.
A hacker who lifted a fingerprint to bypass Apple’s new Touch ID has urged calm saying the login measure was still valid.
Organisations are increasing their defences but it still isn’t enough to protect against today’s threats
An identity theft service that sells Social Security numbers, birth records, credit and background reports on millions of Americans has infiltrated computers at some of America’s largest consumer and business data aggregators
LONDON (UK), XX September 2013: Nearly 30% of employees are using personal cloud services to store work-related documents, according to a survey conducted at recent technology trade shows
Application security is an alarming and persistent problem: Nearly one-third of all breaches can be attributed to attacks against web applications, and both web application and database attacks account for most records breached every year.
Keanini brings nearly 25 years of network and security experience with companies including Cisco and nCircle
A common attitude towards information security is that responsibility lies with the IT department.
Lancope, Inc., a leader in network visibility and security intelligence, will deliver a complimentary webinar on Thursday, Sept. 26 at 11:00 a.m. U.S. Eastern time entitled, “Hunting Attackers with Network Audit Trails.”