Access control has many dimensions
This month we will look into three more. Identity management and network access control (NAC) are fairly obvious, while data leakage prevention (DLP) is, perhaps, not.
October 01, 2013
This month we will look into three more. Identity management and network access control (NAC) are fairly obvious, while data leakage prevention (DLP) is, perhaps, not.
This month’s new briefs include insight on the PCI Security Standards Council, DDoS attacks aimed at financial institutions, and more.
This month’s company news features new hires at Narus, Zscaler, and the Advanced Cyber Security Center, as well as new funding secured by HyTrust.
As organizations collect increasing amounts of data related to security and IT risk, the demand for security analytics specialists is high.
By mining log data and managing it proactively – instead of ignoring it until something goes wrong – organizations can mitigate risk, ensure service availability and promote operational efficiency.
Targeted malware attacks are growing in number, sophistication and severity in the potential damage they can inflict on victims.
This month we asked Gregory Gong, managing partner, Wall Street IT Management, about his job.
Cloud providers must be evaluated before moving operations, says the DTCC’s Mark Clancy.
A school district in New Hampshire needed to enable its students and faculty to use mobile devices wirelessly, while retaining security and performance control over its network.