Identity management company innovates with a REST API for directories - now available for download.
When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on removing the malware. Customers will continue to browse to specific sites and access infected content, whether they know they are doing it or not. Because of this, it’s critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.
- By Eileen Turner
- Apr 25, 2014
To secure the mobile workforce at the age of BYOD, IT security professionals and line-of-business executives must consider how mobility impacts their business risk profile.
- By Yishay Yovel
- Apr 18, 2014
Protect your digital life with this checklist of must-do security tasks.
- By Ginger Hill
- Apr 17, 2014
A short but close look at the murder of the password by biometrics, from the mainframe to the smartphone.
- By Ginger Hill
- Apr 16, 2014
By 2015 Next Generation Identification (NGI) will have millions of stored facial images.
- By Ginger Hill
- Apr 15, 2014
When selecting a payment processor be sure to select one that has these characteristics to maintain secure data integrity.
- By Avery Buffington
- Apr 09, 2014
According to Saddleback College Chief of Police, Christopher Wilkinson, the childcare center in particular was a top priority due to concerns related to the Sandy Hook Elementary tragedy and other similar violent incidents.
- By Domingo Martinez
- Apr 01, 2014
When properly constructed, a cloud infrastructure can offer greater security than a legacy system; however, when poorly constructed, a cloud-based infrastructure introduces risk across the enterprise.
- By Sumeet Sabharwal
- Apr 01, 2014
Unique, event-based video discover platform coming to ISC West 2014.
Is this a violation of our Second Amendment right or is this responsible gun selling/ownership at it's best?
- By Ginger Hill
- Mar 06, 2014
Atchison Frazer, CMO for KEMP Technologies, talks hackers and other security attacks being a source of server downtime and how you can use ADCs to protect your network(s.)
- By Atchison Frazer
- Mar 05, 2014
We live in a world full of information as data is being collected each day because the demand is higher than ever before. Consumers want faster access to online data to make quicker, more informed decisions regarding everything from nearby restaurants to the highest-rated tablets.
- By Mike Scirica
- Mar 01, 2014
Major SSL vulnerability allows hackers to launch MITM attacks on iOS devices.
- By Ginger Hill
- Feb 24, 2014
The five golden rules of developing a strong network security strategy for managing vendor access.
- By Jeff Swearingen
- Feb 04, 2014
There are tens of thousands of bank branches and financial services locations throughout the world. The business environment itself is complex, as it combines elements of high-end commercial services with a frontline, retail component.
- By Joe Pellettiere
- Feb 01, 2014
For about the same price, a smart credential provides a higher level of security, more convenience and far greater functionality than a proximity card. As used on college campuses and in newer access control systems, smart credentials have the ability to manage access, payments and many other functions much more securely.
- By Jeremy Earles
- Feb 01, 2014
Looks like it is just about time for biometrics to make its long awaited debut. Yes, we have seen biometrics for quite some time, and it is true that the impact has been strong in the security world. But, get ready to see biometrics on steroids. It’s coming.
- By Ralph C. Jensen
- Feb 01, 2014
Things you need to do NOW if you have recently shopped at this arts and crafts store.
- By Ginger Hill
- Jan 27, 2014
As the result of recent research and investigation, Target Corp. has upped the number affected by the data breach during the holidays.
- By Ginger Hill
- Jan 10, 2014