Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
Access control is, arguably, the key aspect of information protection.
This month we will look into three more. Identity management and network access control (NAC) are fairly obvious, while data leakage prevention (DLP) is, perhaps, not.
Safe Access from StillSecure is a feature-rich network access control appliance that can detect and monitor many types of endpoints throughout the network and ensure they comply with the enterprise policy before access to network resources is granted
AIMS provides a complete set of identity management (IdM), network access control (NAC) and data leakage prevention (DLP) features.
Tools for data leakage prevention, identity management and network access control form a layered ecosystem to help prevent attacks and exfiltration of assets, says Peter Stephenson.
By leveraging an existing infrastructure enterprise, Centrify Suite 2013.2 Platinum Edition provides central control and securing and auditing of user access through cross-platform systems, mobile devices and applications.
Today's Network Access Control (NAC) technology has evolved well beyond that of allowing or denying network admission. The latest generation of NAC solutions addresses numerous security and compliance applications, but more so, help organizations enhance operational awareness, efficiency and use of their existing network and security infrastructure.
Cloud services have become ubiquitous. Many organizations, though, having embraced their various benefits, sometimes have overlooked some of their problems - including those that can arise because of security weaknesses, as a recent SC Magazine survey, which was sponsored by McAfee, has further affirmed. There are a slew of worries...
Healthcare IT must satisfy a myriad of compliance mandates, enable employee and non-employee caregiver use of latest personal mobile and medical devices, and protect network operations and sensitive information - all while optimizing resources and costs? How are innovative security professionals supporting patient care priorities while mitigating access, privacy...
A trojan variant, Linkup, identified by Emsisoft, takes control of DNS servers, blocks internet access and mines Bitcoins.
Hackers were able to access the credentials for more than 7,000 file transfer protocol (FTP) sites and, in some instances, upload malware to affected FTP servers.
An unknown attacker accessed the pop singer's account for about 15 minutes mid-afternoon on Saturday and tweeted multiple times before Bieber's team regained control.
We must stop the insanity by focusing on the data and controlling privileged user access.
In a perfect world, enterprises would know exactly when an auditor is going to show up, the questions they will ask, and data would be presented on a silver platter ready to prove the organization's compliance.
The AndroRAT APK Binder is being sold on underground forums, giving online vandals with little to no skill an easy way to "trojanize" legitimate apps.
Our educational institutions continue to set the pace in BYOD.
Attackers are using malware, called "njRAT," to hijack victims' computers and spread to others in the organization.
An HHS report, based on audits between 2010 and 2012, noted serious vulnerabilities affecting 10 state Medicaid agencies.
A Utah university found a solution to enable secure access to the campus network - while cutting down on help desk calls, reports Greg Masters.
Shantanu Gawde, a 17-year-old security researcher, has become the first person to infect the newly released mobile Firefox OS with malware.