Privileged insiders hold the keys to the kingdom and any damage they cause, whether maliciously or inadvertently, can be extremely costly.
Welcome to the new security blog, a group effort from the analyst security team at Bloor.
The new authentication standard from the FIDO alliance will do much to solve problems related to secure online authentication.
Targeted attacks are on the rise, including a major resurgence in DDoS attacks
Adding intelligence to advanced threat detection and protection
NAC technologies are continuing to evolve and are being repositioned as network security platforms.
New data reiterates the importance of APIs for enabling the extended enterprise.
APIs are the key enablers for efficient collaboration in the extended enterprise
The ISO 27000 standards are a good basis for an Information Security Management System - and an update is expected this year.
On-premise and cloud capabilities seen as equally important
New capabilities built from the ground up specifically for Mac users