Technology -> Security
Five ways to make identity management work best across hybrid computing environments
A BriefingsDirect discussion centers on learning new best practices for managing the rapidly changing needs around identity and access management.
Dana Gardner, Interarbor Solutions | 30th October 2014
Datacentres as a commodity
For those working in the fast moving world of cloud computing it is easy to take the view that the choice of data centre is irrelevant; that although it is an essential piece of the jigsaw, one data centre is just the same as another.
Nick Razey, Co-founder and CEO, Next Generation Data | 15th August 2014
Belt and braces: how to keep end user computing secure
Effective user end point security must address managed and unmanaged device, this requires centralised as well as on device controls. The best starting point is to focus on data
Bob Tarzey, Quocirca | 12th August 2014
The security and visibility of critical national infrastructure: ViaSat's mega-SIEM
Critical national infrastructure is dependent on network communications which should be protected in the same way as dedicated IT networks. This includes security information and event monitoring (SIEM).
Bob Tarzey, Quocirca | 30th July 2014
Data Classification, it's a people thing!
Data classification is an important aspect of security, especially for the often-neglected Office documents and emails that most companies run on. It's a fairly obvious concept-an employee...
David Norfolk, Bloor Research | 29th July 2014
Do increasing worries about insider threats mean it is time to take another look at DRM?
Whether their actions are malicious or careless, the actions of insiders are of increasing concern to businesses. How can digital rights management (DRM) help protect secrets and regulated data?
Bob Tarzey, Quocirca | 17th July 2014
Business headlines from BBC News:
Published by: electronicdawn Ltd.