The benefits of adopting cloud technologies have been widely reported and are commonly understood. However, cloud brings with it many questions and concerns about jurisdictional and regulatory control over the privacy and protection of sensitive data.
Browsing: Identity and access management (IAM)
Varonis, the leading provider of comprehensive data governance software, today detailed how it has helped AXA Wealth identify and control its data permissions.
Andy Green of Varonis shares his thoughts on the latest privacy showdown coming from the EU
An email address that’s used for online banking and business purposes can be highly valuable for cybercriminals.
Remotely taking control of someone’s computer is not an unheard of hacker exploit, but this claim about remotely controlling a Chinese hacker’s webcam is just crazy.
Tumblr’s iOS app fails to log users in through a secure (SSL) server, it has emerged.
On the tiny Mediterranean island of Malta, two Italian hackers have been searching for bugs—not the island’s many beetle varieties, but secret flaws in computer code that governments pay hundreds of thousands of dollars to learn about and exploit.
A new Red Alert Research Report from Varonis, based on survey data from 248 information security professionals, indicates that a mere 6% of companies have automated breach detection.
Over the last number of years there has been a noticeable rise in the number of reported targeted attacks, which are also commonly referred to as advanced persistent threats (APTs). Notable examples of said attacks include the Red October campaign or the IXESHE APT.
Metaforic announced the general release of WhiteBox, a secure cryptography solution for mobile financial, conditional access, BYOD and embedded communications and payments.