Your Search returned 20 results from our Editorial content

Sort By

ACCESS CONTROL

Google & the race for ‘finger-free’ smartphones

We look at Google’s Project Soli and what it may mean for future of tactile tech

HUMAN RESOURCES

Up in smoke: How marijuana shops in Colorado are protecting...

The moment I walk into the 3D Cannabis Center in Denver, Colorado, I'm approached by a security guard, taser on his hip, who requests my identification. As I fumble...

   

ACCESS CONTROL

NEC launches face-recognition protection for PCs

NEC has launched a biometric security program that uses face recognition to unlock access to PCs.

DATA PRIVACY AND SECURITY

Web apps and point-of-sale were leading hacker targets in...

Web application attacks, cyber-espionage and point-of-sale intrusions were among the top IT security threats in 2013, according to Verizon's latest annual report...

   

VOIP

Secusmart puts its BlackBerry encryption chip to work on...

At around €2,000 (US$2800) each, the secure smartphones that SecuSmart showed at Cebit last year were out of reach of many businesses -- although three governments...

DATA PRIVACY AND SECURITY

Amazon.com security slip allowed unlimited password guesses...

A gaping hole in Amazon.com's mobile application, now fixed, allowed hackers to have an unlimited number of attempts guessing a person's password, according to security...

   

SECURITY

Cybercriminals compromise home routers to attack online...

Attacks recently observed in Poland involved cybercriminals hacking into home routers and changing their DNS settings so they can intercept user connections to online...

ACCESS CONTROL

Snapchat's new image-based human verification system already...

Snapchat added an image-based security challenge to its account registration process to verify that new accounts are created by humans, but the system can easily...

   

WI-FI

Hacker-built drone can hunt, hijack other drones

A security researcher has released software and technical instructions for modifying a drone so that it can identify and hijack other drones.

ACCESS CONTROL

Some password managers are safer than others

Susan Taylor worries that password managers may not be sufficiently secure. "What if the password manager company is hacked?"

   
   
Previous 1

Your Search returned 12 results from our White Paper Library

Sort By
CA Technologies

Business Management

Addressing PCI Compliance

Read this paper to discover how to address PCI compliance through privileged access management.


Twelve Best Practices for Privileged Access Management

Business Management

Twelve Best Practices for Privileged Access Management

Read Gartner’s best practices and learn how to implement effective and risk-aware privileged access management.


CA Technologies

Business Management

Addressing PCI Compliance

Read this paper to discover how to address PCI compliance through privileged access management.


Centrify

Business Management

Twelve Best Practices for Privileged Access Management

Read Gartner’s best practices and learn how to implement effective and risk-aware privileged access management.


Centrify

Business Management

Twelve Best Practices for Privileged Access Management

Read Gartner’s best practices and learn how to implement effective and risk-aware privileged access management.


RES Software

Business Management

The Policy-driven Approach that Transforms Access Management:...

This paper looks at how to make the transition from traditional role-centric access management to an effective technology-enabled and policy-driven strategy....


RES Software

Business Management

The Security Balancing Act: How Do You Empower Users While...

This infographic highlights the challenges of onboarding and offboarding in the age of the agile worker.


Akamai

Business Management

5 Reasons Enterprises Need a New Access Model

This paper looks at how you can overcome your IT challenges by investing in new access architecture.


Four Kinds of Password Management

Business Management

Four Kinds of Password Management

This Gartner report looks at the primary issues facing security and risk management leaders when it comes to password management.


Quest Software

Business Management

Controlling and Managing Privileged Access: A Primer on...

This white paper explores the risks associated with privileged accounts, and explains how to mitigate them.


Previous 1

Recommended for You

phil-muncaster

How a Washington crackdown on Huawei could backfire for everyone

Phil Muncaster reports on China and beyond

dan2

5G is over-hyped and expectations need reining in

Dan Swinhoe casts a critical eye on the future

keri-allan

What can we learn from tech initiatives in the Middle East?

Keri Allan looks at the latest trends and technologies

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should the government regulate Artificial Intelligence?