Cyber-Ark® Software is a global information security company that specializes in protecting and managing privileged users, applications and sensitive information to improve compliance, productivity and protect organizations against insider threats and advanced external threats.
Browsing: Identity and Access Management (IAM)
Becrypt was formed in 2001 to meet the growing demand for enterprise security and endpoint security software platforms for personal computer and the growing mobile computing marketplace.
Few who follow the ongoing, often vociferous international debate about the proper balance between protecting society and guarding civil rights and personal privacy will have been totally surprised last week to learn that the US government’s secretive National Security Agency (NSA) and Federal Bureau of Investigation (FBI) regularly access internet and phone records.
Dropbox has recently revised its claims on how securely they maintain user data, prompting a lawsuit claiming that Dropbox has misled its customers about its privacy policy and encryption processes.
Last week, Denmark’s national police revealed that, in the summer of 2012, hackers might have stolen and modified information from the police driving license register, including the personal identity number register (CPR).
As a slightly amusing coda to the story of Edward Snowden take a look at this Booz Allen job listing posted May 22 for an Information Security Engineer in Honolulu. You could literally be the next Snowden if you have the right stuff.
The Government must tell the public if it has access to information about New Zealanders it may have received from the United States’ National Security Agency, Green Party Co-leader Dr Russel Norman said today.
Cutting off the Internet was the ultimate and third penalty step against those caught breaking the anti-piracy law.
Dubai: Hackers today don’t even need to gain access to a target’s computer and could use “social engineering” on the target when it comes to disclosing information, Kevin Mitnick, the hacker-turned international cyber security consultant and the keynote speaker at the inaugural Gulf Information Security Expo and Conference (Gisec) Conference taking place at Dubai World Trade Centre, said.
As more employees continue to access consumer cloud accounts at work (regardless of IT rules), the enterprise world is about to reach a breaking point, based on a new report.