Security and Identity Management in the Gaming Industry
Posted on 11 June 2018 by
Last week we held a webinar with Veridocs on security and identity management in the gaming industry. Here are our 5 key takeaways from the session.
Posted on 11 June 2018 by
Last week we held a webinar with Veridocs on security and identity management in the gaming industry. Here are our 5 key takeaways from the session.
Posted on 17 July 2017 by
Verizon’s breach highlights the need for cloud singlesign-on. Discover the best way of implementing effective cloud access control measures and why is it so important?
Posted on 14 June 2017 by
As a former engineering student who established his career in tech marketing, it’s a privilege to have been part of several technological revolutions that are improving the lives of billions of people worldwide. I’ve always been interested by the way progress impacts usage. I thought that technology moved quickly back then, but it’s exponentially faster […]
Posted on 14 December 2016 by
The authentication and identity management index reveals what IT professionals are concerned about their data security. What are your access management concerns and how will you address them?
Posted on 12 January 2015 by
With new mobile devices like the iPhone 6 and Apple iPad Air 2 topping many present lists this year, we’ve compiled top tips to help businesses ensure they haven’t unwrapped mobile security threats over the festive period.
Posted on 07 November 2014 by
The CFO arguably has the top job when it comes to assessing risk and making decisions on security investments. Most will have the support of the CIO in evaluating all the risks associated with technology, but have they considered all the issues that modern working practice expose the executive management team to?