The defense of digital information and IT assets against internal and external, malicious and accidental threats.

Posts

Businesses are increasingly expanding the number of their applications and systems. In turn, it has been reported that Identity and Access Management (IAM) has leaked into becoming a business problem, not just an IT problem. Many companies are struggling to provide integrated employee access to the extent of applications and systems.

Entrepreneurs trying to grow their businesses are juggling so many demands on their time that they may find themselves unwittingly leaving the back door open to cybercriminals.

Leverage Azure and Office 365 for Multi-factor Authentication. The geo-distributed, high availability design of Azure AD means that you can rely on it for your most critical business needs. With the prevalence of smart phones, tablets, laptops, and PCs, people have far too many options on how they are going to connect, and stay connected, at any time. Multi-Factor Authentication through Azure is an easy to use, scalable, and reliable solution that provides a second method of authentication so your users are always correctly authenticated.

Israel has accused Hamas – a Palestinian Islamist group – of using a World Cup live scores and fixtures app and two fake dating apps to hack soldier’s smartphones and spying on them. Who can be safe from cyber-criminals and hacking?

I am sure that everyone has heard of Amazon Echo and Smart Watches such as the Fitbit. However, what is the Internet of Things? Lots of research focuses on IoT in business and commerce. This blog will answer the question: what can the IoT do for me?

The agency doesn’t ask for explicit consent to collect the voiceprints; and, the…

Cloud may already be the heart of many companies’ infrastructure but it would be nothing without the veins of connectivity that keep the data flowing. The survey asked if respondents were considering moving additional applications and services to the cloud and what connectivity companies use to access their cloud solutions. This was split out from their normal office connectivity unless they relied upon an open public cloud connection.