London conference themed “New Era, New Edge” brings global experts together to examine assurance, risk and security
Browsing: Identity and Access Management (IAM)
David Gibson, vice president, Varonis, takes a look at how we can organise, analyse and utilise the contents of the biggest wave of human creativity that has ever engulfed the world.
IBM has teamed with more than 1,000 universities worldwide with the intent of building a future “pipeline” of data scientists.
A man using the British Library’s wi-fi network was denied access to an online version of Shakespeare’s Hamlet because the text contained “violent content”.
A Cryptzone security survey undertaken amongst SharePoint practitioners at the Microsoft conference in Las Vegas, reveals how many organizations have inadequate security and governance measures
Information security has always required specialised knowledge – not least to decipher all the acronyms and geek speak!
I have spent the last 18 months pondering on the whole sphere of identity and authentication and a number of things have happened:
The generation gap has existed for –well — generations. But the current divide between twentysomethings and their elders in the IT workforce
Herndon, VA ● Washington, DC (12 August 2013) — The Industrial Control System Information Sharing and Analysis Center (ICS-ISAC) announced today that Raytheon Trusted Computer Solutions (RTCS),
Attending BlackHat is something that most security professionals look forward to. It’s an opportunity to meet similar folks on both sides of the security aisle, have a drink, share stories and compare notes.