Where is access governance? Everywhere. This is the next step forward in the evolution of what to this point has been known as the identity and access management sector; the coming and future leader of the sector.
Dean Wiech |
15 Nov |
Read more
When you imagine the world of espionage, do you think of undercover agents trying to recruit a mole or cracking safes to steal sensitive information? Those who do, may be thinking in the past. The game has changed.
Eric O’Neill |
03 Nov |
Read more
This week, Oracle released its Critical Patch Update for October 2016. It closes multiple vulnerabilities, so Oracle administrators will face the task of testing, verifying, and deploying dozens of patches.
Alexander Polyakov |
01 Nov |
Read more
Identity and access management (IAM) has traditionally been associated with solutions designed to manage employee access to on-premises applications and systems, but these days it’s a whole lot more.
Mark Perry |
01 Nov |
Read more
Cybersecurity is the hottest topic in the IT world at the moment, thanks to the massive DDoS attacks against Brian Krebs' "Krebs on Security" website, against French hosting provider OVH, and, most recently, against Dyn’s DNS service, all of which came from compromised IoT devices, including DVRs and security cameras.
Kimberley Parsons Trommler |
28 Oct |
Read more
It’s no secret digital technologies have changed everything.
Joshua Kennedy-White |
25 Oct |
Read more
Old hands from the last millennium know that whenever a manufacturer brought a new application or a new version of an application onto the market, users were often abused as beta testers.
Phil Trainor |
25 Oct |
Read more
Much like the previous year, 2016 has seen the Internet of Things (IoT) phenomenon continue to be a hot topic amongst the IT industry.
Robin Schmitt |
25 Oct |
Read more
As you know, the second Tuesday of every month is known among the cybersecurity community as a Patch Tuesday.
Alexander Polyakov |
17 Oct |
Read more
As commerce continues to shift online, IT managers are finding themselves juggling two competing priorities.
Mark Perry |
14 Oct |
Read more
The number of detected security incidents in Australia increased by 109% in the last 12 months according to PwC’s Global State of Information Security® Survey 2016.
Scott Crane |
14 Oct |
Read more
With surge in the number of cyber-attacks and hacking incidents, innovative and fool-proof cloud security services are reinstating faith in data storage for many individuals and organizations.
Amitabh Sahare |
13 Oct |
Read more
A hospital staff member, expecting delivery of an online purchase, opens an email claiming to contain details of a parcel delivery.
Nathan Lowe |
12 Oct |
Read more
Cyber-attacks continue to become more advanced and sophisticated than ever before.
Steve Durbin |
11 Oct |
Read more
Protecting your network and your sensitive data requires having the right protections in place. Here are 10 of these measure you need to be using.
Joy Mal |
04 Oct |
Read more
Mobile devices have become indispensable tools in the world of business, however mobile devices are also a growing threat to enterprise security.
David De Laine |
03 Oct |
Read more
At Okta’s annual conference (Oktane 16) in Las Vegas, I sat down with the company’s CEO, Todd McKinnon, to get his view on the current state of information security and where he sees it heading.
Krishan Sharma |
03 Oct |
Read more
When it comes to effective identity and access management (IAM), most businesses tend to focus on achieving secure employee access to on-premise applications. Yet, as commerce increasingly shifts online, IAM for customers is becoming just as important.
Mark Perry |
28 Sep |
Read more
Australia is going digital with a vengeance. According to IDC, as the country embraces the National Innovation and Science Agenda, 70% of Australian SMBs are already digitally transforming their operations.
Rob Malkin |
13 Sep |
Read more
The importance of context should never—ever—be underestimated. Put up a sign across a path saying “Keep Out” and you can guarantee it will be ignored, and by a sizeable majority.
Maurizio Canton |
02 Sep |
Read more