Login
Password
Sources on this Page

> Headlines by Category

 Home / Technology / Security / Security Administration

You are using the plain HTML view, switch to advanced view for a more complete experience.

A Comprehensive Human Factor Framework for Information Security in Organizations
Human factor represent an essential issue in the security of information in organizations, as human factor determine the behavior of the employees toward information security. This...
4 reasons cybersecurity now requires an analytics-driven strategy
It's time to rethink your IT security strategy. ESG points out the benefits of the new analytics-driven cybersecurity approach.
Hacking Team breach leads security researchers to unexpected insights
When the Hacking Team breach presented security researchers and hackers with information about exploits at the same time, the race was on. Find out the results.
Ashley Madison hack should serve as your IT security wake-up call
When making the case for investing more money in IT security, reference the Ashley Madison hack as an example of what you don't want to happen at your company.
Dell: Why Managing Privileged Accounts Is a Prerequisite For PCI DSS Compliance (German)
For many organizations, compliance with data security standards remains a problem. IT projects for security compliance are in constant competition withProjects to combat persiste...
Dell: Why Managing Privileged Accounts Is a Prerequisite For PCI DSS Compliance (German)
For many organizations, compliance with data security standards remains a problem. IT projects for security compliance are in constant competition withProjects to combat persiste...
Dell: Strategies For Successfully Managing Privileged Accounts ( German )
Security, management and governance of the accounts of superusers ( so-called privileged accounts) is one of the most important aspects of a program for the identity and Access Man...
How Portal Can Change Your Security Forever
When used correctly gamification can be one of the most effective tools for changing behavior on a large scale, but it requires more than just designing a few digital merit badges ...
Authorization With Oauth 2.0
OAuth 2.0 is an open standard for authorization and is becoming the de facto standard to integrate with social media like Facebook and Twitter. It allows users to share private res...
Delivering mobile workforce productivity at the edge and business assurance at the core (FR)
HP Connected MX addresses the challenges of managing mobile information within a dispersed corporate environment. Organizations need a solution that delivers business assurance wit...
Post Selected Items to:

Showing 10 items of 58

home  •   advertising  •   terms of service  •   privacy  •   about us  •   contact us  •   press release design by Popshop •   Official PR partner PRNews.io •   © 1999-2015 NewsKnowledge