This summer we’ve seen a number of high profile data breaches, from the IRS leaking 100,000 Social Security numbers to Japan’s government accidentally sharing internal emails with the public through Google Groups.
Browsing: Identity and Access Management (IAM)
The Center for Automotive Embedded Systems Security (CAESS) conducted a study showing what could happen if a determined hacker went after the computer systems embedded in cars.
While UK and US unemployment figures are falling slightly, times are still difficult for many workers, and few are changing roles.
I’ve written before about the huge benefits you can reap if you plan for large sitewide outages by giving yourself access to all the troubleshooting tools you’ll need ahead of time.
Almost nine out of 10 senior staff members from Australian organisations have access to corporate data on their personal mobile phones.
Fraud has become an industry, with cybercriminals seeking profits through innovation, automation, commoditization and specialization. How do you respond to this criminal industry to ensure trust in IT?
The Syrian Electronic Army has breached the official blog of Channel 4, the popular British public-service television broadcaster.
GCHQ has always been the prime overseas partner for the NSA – and it has long been suspected that each partner within the Five Eyes relies on the others to circumvent its own domestic laws. This is denied, but…
The brain is a deviously complex biological computing device that even the fastest supercomputers in the world fail to emulate.
Free the User | Contain the Threat – Invincea Webinar on Friday, August 9th, 2013 at 2:00 PM EDT