Access control

New Georgia law criminalizes good-faith security research, permits vigilante action

Georgia cybersecurity folks are outraged about SB 315, and warn that it could cost the state jobs.

Partner Content
Gemalto provides customers enhanced data security for cloud, hybrid and on-premises data storage deployments with NetApp

Gemalto SafeNet KeySecure integration with NetApp provides centralized key management for thousands of volumes across multiple clusters

5 myths of API security

In light of Panera Bread’s API-related data breach, here what is — and isn’t — true about protecting application programming interfaces.

Gemalto validates SafeNet KeySecure to enhance data security

SafeNet KeySecure’s validation has been done with the latest release of NetApp Volume Encryption (NVE) data management solution.

5 biggest healthcare security threats for 2018

Healthcare continues to be a popular target for ransomware, cryptomining, data theft, phishing, and insider threats.

Cisco bolsters Tetration for better cloud, workload security

Cisco’s Tetration analytics upgrade focuses on protecting data center workloads and detects potential application vulnerabilities.

Feds move to secure mobile devices with machine learning, biometrics

As mobile device use increases among U.S. government workers, IT and security officials are scrambling to better secure devices, leaving behind traditional anti-malware tools in favor of mobile threat detection and role-driven access rules.

Partner Content
Learning Path: Developing Microsoft Azure and Web Services (Microsoft Exam 70-487)

Microsoft offers a set of certifications that validate a software developer's expertise in Microsoft technologies. 

Partner Content
Editor's Playlist: Developing ASP.NET MVC Web Applications (Microsoft Exam 70-486)

Microsoft offers a set of certifications that validate a software developer's expertise in Microsoft technologies. 

Partner Content
Knocking-off NAC, just not yet!

This article talks about the renewed need for Network Admission Control (NAC) solutions in organizations dealing with employees, guests and contractors connecting through various devices to the corporate network

6 use cases for blockchain in security

Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection.

What is access control? 5 enforcement challenges security professionals need to know

Access controls authenticate and authorize individuals to access the information they are allowed to see and use.