A tidal wave of structured and semi-structured data is drowning the enterprise – documents, video and audio – and to get value from this data, and turn it into an asset, people across many teams need to be able to collaborate and share that data.
Browsing: Identity and access management (IAM)
Today, an article on TheRegister caught my eye. It was also reported on Bloomberg. Two ex-employees of a Wall Street trading company – Flow Traders – are facing criminal charges for leaking trading evaluation algorithms from their previous employer.
When we discuss exploit prevention, we often talk about ‘targeted applications.’ This term refers to end-user applications which can be exploited by hackers for malicious purposes. There are a few requirements that define these applications.
GlobalSign, a Certificate Authority (CA) focused on solutions for enterprises, today launched a new solution that integrates with Windows Active Directory and allows enterprises to automate the enrollment, provisioning and management of GlobalSign digital certificates for Windows environments.
Appthority and AirWatch announced that AirWatch EMM is integrated with Appthority’s fully automated App Risk Management service for app analysis and risk management.
Were you trying to access a .cn Internet address over the weekend? Are you still hitting refresh?
The latest victim of the Syrian Electronic Army is ShareThis.com, the popular sharing platform. ShareThis is only the latest in a long line of Internet companies targeted by the hacktivists.
Leaving your old PC in a public space may seem like a sure-fire way to make it someone else’s old PC. But if you take the time to secure it properly, you can get a lot of mileage out of turning it into a dedicated public-access machine.
It only took one attack last week, but it was enough to allow the Syrian Electronic Army (SEA) to compromise The Washington Post, CNN and Time.
Gaming Companies, and especially those who provide a cloud service for either online play or account management are a great and very compelling target for attackers.