Quantcast
Channel: The Business-Technology Weave » access security
Browsing latest articles
Browse All 4 View Live

Identity and Access Management

Organizations, from small through medium businesses (SMB), to large global enterprises, must control access:  to systems, environments, resources, and data.  Access is limited to, and by, individuals...

View Article



Large security vendor suffers breach

  It’s been reported that RSA Security has been attacked, with the result being “certain information… being extracted.”  Had you heard about this?  I was alerted to it through my Google Alerts.   As a...

View Article

Ahhh, New York City you talk a lot; let’s have a look at ya…

  (With apologies to Mick Jagger/Rolling Stones -  NYC, Madison Square Garden, 1969).   I was going to title this particular article, “If I can breach it there…, I can breach it… anywhere…”   Followed...

View Article

Image may be NSFW.
Clik here to view.

Crucial Considerations when Going Mobile, Pt. IV – Security

Security is of prime concern in the mobile environment. IT security in any realm involves logical security and physical security.  Logical security is the integrity of data (content), precision of...

View Article
Browsing latest articles
Browse All 4 View Live




Latest Images