A Toronto-based firm has launched a new service that will allow companies to confirm the identity of their employees and customers using smartphones and third-party profiles, while keeping privacy in tact. SecureKey Technologies
Cyber-criminals have amassed so many credentials for various social networks and Web services that they are now creating the equivalent of discount factory outlets to sell them off, Trusteer Research reports. The Web
Depending on what your cloud application is doing, there will be several levels of access control. The simplest is at the file level: the operating system will enforce user/group/world or access control lists
Finding qualified personnel to secure corporate networks can be difficult, especially for HR professionals who may not understand how the industry works and what qualities they should be looking for in a candidate.