Identity And Access Management (IAM)
Half of new retail customer identities will be social networking-based by the end of 2015, which is why merchants need to boost their controls, according to Gartner.
The apps used on mobile devices connected to its network contained sensitive data, so a medical device manufacturer needed to ensure that access control and authorization policies were enforced.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Hanjuan Exploit Kit leveraged in malvertising campaign
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- Amedisys notifies nearly 7,000 individuals of potential breach