Organizations can borrow lessons from the medical industry and use herd immunity and information sharing to stop the spread of malware.
Mobile app management and a corporate app store provide good training grounds for increased security in a controlled mobile state.
Database encryption can be drastically improved through the use of hardware security modules (HSMs), which provide offline encryption services.
Katherine Teitler, content director for major security conferences, sat down with IBM to discuss what goes into choosing security conference
The financial services sector is facing a barrage of attacks, with many institutions having been subjected to damaging security breaches recently.
Customer Case Study Webinar on Identity Governance In a world where the identity, compliance and security challenges are constantly changing, Identity Governance must continuously evolve. An effective Governance solution should combine the knowledge and mindset of an auditor, a security vendor and of course, the customer. E.ON Global Commodities, one of the world’s largest investor-owned […]