An Algerian hacker has hijacked the official Facebook account of Syriatel, a major Syrian telecoms company owned by a cousin of President Bashar al-Assad.
Browsing: Identity and access management (IAM)
In 2010, I gave a (in retrospect somewhat optimistic) talk at the Catalyst conference in which I described a pull-based architecture for account provisioning.
A survey of 300 information security professionals in Europe finds companies unwilling to make data breaches public
Our Post colleagues have had a busy day. First, they released documents revealing the U.S. intelligence budget from National Security Agency (NSA) leaker Edward Snowden. Then they recounted exactly how the hunt for Osama bin Laden went down.
Information security practitioners know all too well that garnering the support of senior management, can significantly benefit, and advance, their long-term application security objectives for the organization.
Most people reading this article will not remember when these famous words were first broadcast. It was at the end of a speech by Winston Churchill on February, 9th 1941. What he said was this:
Over the last few years CSOs are quickly coming to the realization that they have a tsunami of SaaS apps they have to manage, and they are recognizing that the cloud poses unique security requirements
During the summer months many of us look forward to a couple of weeks away from the office. However, in reality, complete radio silence from those left behind is not always an option.
RSA® Conference Europe 2013 has moved this year to the Amsterdam RAI in The Netherlands. Join us and immerse yourself in hot topics, insider knowledge and practical advice from information security experts.
A 17-year-old Australian who in February claimed to have breached networks at Microsoft and Sony will plead not guilty to charges stemming from a police raid on his home.