Imagine if an outside management consultant came into an enterprise and said,“I have a surefire technique for boosting worker productivity by 13%, reducing staff turnover by 50%, and making about $2,000 more in profit per employee.” Upper...
Google’s Advanced Protection Program uses physical security keys to tighten G Suite security.
Idaptive CEO Danny Kibel discusses the new company's focus on IDaaS and the benefits of a zero trust model for access.
Next-Gen Access Cloud combines single sign-on, multifactor authentication, endpoint and mobile context, and user behavior analytics.
Two recent reports highlight three major challenges in enterprise endpoint security.
Aug 02, 2018
A more comprehensive defense in the battle to reduce risk and enhance security
Aug 01, 2018
The use of weak, default or stolen passwords are involved in many recent high-profile data breaches. Two-factor authentication is the simplest and most secure way for organizations to solve the password problem. However, not all two-factor...
GlobalSign debuts IoT-focused PKI infrastructure that can spit out thousands of certificates per second.
I’m arguing for opt-in-only in any relationships between individuals and other individuals or groups when it comes to PII. It's as simple--and modest (and not in the satirical way)--as that.
The company is examining apps that had access to user data before the platform’s policies changed in 2014, reducing the information they could access.