Identity and access management in the cloud

The growing prevalence of shadow IT caused by BYOD and remote working is making an existing security problem much worse: how do you protect an increasing number of passwords used for an increasing number of cloud applications?

Read More >>

Java security settings can be ignored by malware

New vulnerabilities and flaws in Java are so common and frequent that it is difficult to keep pace. Less than two weeks ago it was revealed that the Java sandbox could be bypassed; now it is disclosed that the complete security settings can be ignored.

Read More >>

Advocacy groups mark Data Privacy Day with key announcements

The year 2012 was a very bad year for data breaches, with more than 240 million records compromised. So, to mark this week’s international Data Privacy Day, the Online Trust Alliance has released its ‘2013 Data Protection and Breach Readiness Guide’ to…

Read More >>