Cloud, BYOD Increases Need for Automated IAM Systems

As traditional security concepts of perimeter and end-point defense break down as a result of the proliferation of cloud services and the BYOD phenomenon, enterprises are increasingly feeling the need for greater control over access to applications. That's where automated identity and access management comes in. View full post on…

read more

Is Your Cloud Provider Exposing Remnants of Your Data?

Security researchers report that incorrectly configured hypervisors can lead to a separation of data issue in multi-tenant environments that can expose data remnants. However, you can prevent hosting your data on 'dirty disks.' View full post on Computerworld Security News View full post on National Cyber Security » Announcements

read more

Securing your business in the cloud

Any IT professional who has heard “send it to my Gmail” echo across the office will know how impossible it is to keep employees from using outside applications for work when those provided don’t quite meet their needs. View full post on Techworld.com security View full post on National Cyber…

read more