Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Please Join us for an Interactive Security Happy Hour Event on Wednesday in Washington, D.C.
Please join Trend Micro and SecurityWeek on Wednesday, Oct. 30th at Neptune's Waterfront Grill & Bar in San Francisco for an interactive security event with great food and open bar!
Please Join us for an Interactive Security Happy Hour Event on Wednesday in Washington, D.C.
LoginWall is a provider of user authentication. The idea is to add stops that become part of the password. SecurityWeek sat down with CEO Israel Alfassi to discuss the security startup.
Verizon Enterprise Solutions is expanding availability of its next-generation, cloud-based identity platform – Verizon Universal Identity Services – to Europe, effective immediately, the company announced on Tuesday
Please join Trend Micro and SecurityWeek this week in Minneapolis or Atlanta for a free security seminar along with with food and open bar!
Please join Trend Micro and SecurityWeek this week in Minneapolis or Atlanta for a free security seminar along with with food and open bar!
CyberARM correlates cyber-landscape intelligence - such as threat agents and attack methods – together with the security posture and the controls’ maturity of the enterprise’s business environment. SecurityWeek sat down with CEO and Co-Founder Shay Zandani to discuss the security startup.
These complimentary educational sessions are designed to be a highly interactive, and bring together industry practitioners from the National Cyber Security Alliance, Cloud Security Alliance and industry partners to help you combat the cyber underworld.
Microsoft rolled out the options for customers to enable multi-factor authentication its Windows Azure cloud service.

FEATURES, INSIGHTS // Identity & Access

rss icon

Ram Mohan's picture
Are your passwords safe? Three simple ways to create memorable yet secure passwords
Jimmy Sorrells's picture
The WikiLeaks exposure highlights a clear need for a change in the way many classified networks are architected and managed, the way organizations manage their most sensitive information, and should also be looked at as a red flag by enterprises.
Markus Jakobsson's picture
In 1998, Intel announced the introduction of processor identities. Anti-fraud practitioners celebrated, security experts busied themselves thinking of the research implications, and privacy advocates were terrified...