Even tech-savvy employees can fall into the trap of assuming security just `happens’, so the IET has issued some sage advice for all PC users, both personal and employed, to ensure that their machine is not the cause of major havoc
Read MoreDespite a seemingly endless collection of stories about data breaches caused, in the end analysis, by the application of less-than-best practices in managing data, breaches of security continue to happen
Read MoreThe malware pair, already branded as cyber-armageden, have also prompted many of the anti-malware vendors to be show their public-spirited side and make available free tools to help track down and remove the malefactors before the day of reckoning
Read MoreAs one of the early contenders in the development of ID as a Service, Centrify now sees its potential as the focal point for IT departments providing policy-based, real-time management of most aspects of cloud security
Read MoreIBM’s Bluemix open cloud platform gets additional tools aimed at helping developers integrate front-end user engagement apps with the all-important back-office systems of record that are the heart and soul of every business
Read MoreThe anonymous team supporting the popular open source encryption software seems to have suddenly ceased their work with no prior announcement, and are suggesting users should move to Microsoft’s BitLocker, leaving uncertainty behind them
Read More