One of the biggest benefits of cloud computing is the level of accessibility it enables - from anywhere, and at…
When large organizations like LinkedIn, Twitter and Facebook report password hacks, it throws some light on how vulnerable current systems…
When in action, a social engineering attack could look like an email received from a government organization or your own…
When the digital revolution started, media companies were among the first ones to embrace it. Today, most media companies create…
Security vs. usability - the debate has been around for quite a while now. Which one would you prioritize? Would…
Best practices and common sense dictate that we use unique, hard-to-guess passwords for each application that we use. However, most…
ADFS (Active Directory Federation Services) is an SSO solution created by Microsoft to authenticate users logging into applications which are…
For organizations, it is crucial to ensure data security and, therefore, IAM has become a crucial part of every network…
The employee lifecycle is an HR model that identifies the different stages an employee goes through during his/her stint at…
Online identity theft, simply put, is impersonation on an online platform. If someone else pretends to be you -- either…