Cloud management practices
Developers can now turn to third-party platforms to meet their credential management needs, says Michael Ginsberg, CEO, Echoworx.
Developers can now turn to third-party platforms to meet their credential management needs, says Michael Ginsberg, CEO, Echoworx.
Securing Android – or any mobile device – will go beyond standard protection methods, says Gareth Maclachlan COO, AdaptiveMobile.
Assessing what level of risk is acceptable to one’s business is key to any move to the cloud, says Siobhan Byron, president of Forsythe Technology Canada.
As agencies are forced to do more with less, government security pros at a recent SC Magazine Roundtable discussion said they are being challenged to fight emerging threats and secure new technologies.
The work being done by Kathleen Styles at the U.S. Department of Education is emblematic of a growing surge of privacy-led initiatives within the public and private sector. But many other firms are still falling short.
Increased compliance and improved data-protection methods have helped ward off a major credit card breach this year. Yet plenty of holes at the merchant level still remain for a class as dedicated as criminals.
The “bring your own device” revolution means that skilled malware writers are going to pay more and more attention to pushing their wares on mobile endpoints. How should businesses respond?
Being prepared, yet nimble, is key to a well-designed mission, says Illena Armstrong, SC Magazine’s editor-in-chief.
Subject matter experts (SME) are the hot property at many leading consultancy firms.
A roundup of cybercriminal activity across the globe.