Technology -> Security
Developing a defensive domain name strategy
In June 2015, UK fashion retailer Karen Millen announced that its anti-counterfeit campaign has stopped the sale of over £2.6m worth of fake garments using the Karen Millen brand name
Gary McIlraith, CEO, NetNames | 28th July 2015
Threatened with extinction: the password
Security experts and industry commentators have been quite vocal about predicting the demise of passwords, or single-factor authentication. So is the end of the password nigh, and if so, what can replace it?
Stéphane Lesimple, Chief Information Security Officer, OVH | 24th July 2015
Analytics and EMV Protection Limit Rise in European Card Fraud to 6% in 2014
FICO report shows cross-border and card-not-present fraud predominate
Daniel Melo, FICO | 23rd July 2015
Securing joined-up government: the UK's Public Service Network (PSN)
UK government organisations can apply to join the UK Public Service Network (PSN). To do so they must be able to ensure and prove their use of the PSN is compliant. Network access control (NAC) technology helps achieve this goal.
Bob Tarzey, Quocirca | 20th July 2015
Is your identity and access management fit for purpose?
European organisations are struggling to adapt legacy identity and access management (IAM) systems for integrating external users. Many are turning the IAM-as-a-service to supplement in-house systems.
Bob Tarzey, Quocirca | 17th July 2015
Masters of Machines II - lifting the fog of ignorance in IT management
Effective operational intelligence improves insight in to increasingly complex IT infrastructure and the way it is used to transact with customers. This reduces the concerns in many areas, with the exception of security.
Bob Tarzey, Quocirca | 15th July 2015
Business headlines from BBC News:
Published by: electronicdawn Ltd.