Cybercrime is on the rise. To combat it, GTU is launching e-Raksha Research Centre - a public private partnership initiative. The spin-off is also aimed at growing the capacity of InfoSec professionals.
The development of authentication technologies that could replace the password is "nearing a tipping point," but there's still several years of work to do, says Jeremy Grant, who oversees the National Strategy for Trusted Identities in Cyberspace.
Private equity firm Veritas Capital will acquire BeyondTrust, a cybersecurity software company, from venture capital firm Insight Venture Partners. Financial details of the acquisition were not disclosed.
Customers increasingly use digital channels to interact with organizations. But these interactions raise new security concerns that must be addressed by IAM solutions, says David Gormley of CA Technologies.
Gemalto plans to acquire SafeNet, a data and software protection provider, for $890 million to help reinforce its identity and access management business. The deal is expected to close by year's end.
Customers increasingly use digital channels to interact with organizations. But these interactions raise new security concerns that must be addressed by IAM solutions, says David Gormley of CA Technologies.
They act like respectable customers, but they're not. Operating individually and in organized rings, bust-out fraudsters tap unsecured credit products with no intention of ever paying them off - behaving normally just long enough for their damage to be classified as bad debt. It's a huge problem; up to 15% of all...
Fraud Summit - San Francisco 2014 - The hackers get the headlines, but behind the scenes the stealthy insiders continue to pose huge fraud risks to banking institutions. And often the fraudsters are senior, trusted employees with privileged access to accounts and competitive data. Register for this session to learn...
In the face of evolving threats and actors, traditional ID security strategies have been proven inadequate, says Entrust's David Rockvam. It's time for a security evolution.
Advice on how to encourage information sharing while preserving control over access to data is provided in a new special publication from the National Institute of Standards and Technology.
Identity is the new perimeter, and that concept stretches organizations into lots of new directions when managing access and privileges - especially in the mobile age, says John Hawley of CA Technologies.
In the face of evolving threats and actors, traditional ID security strategies have been proven inadequate, says Entrust's David Rockvam. It's time for a security evolution.
Leading today's RSA Conference 2014 industry news roundup, Citrix partners with CA Technologies, while WinMagic introduced an encrypted data management solution.
2014 is finally the "The Year of Security." When the year stars fresh on the heels of the announcement that Target has suffered a data breach that impacts tens of millions of consumer payment cards ... that gets attention. And when that's followed up quickly with a second major breach, this one of luxury retailer...
Government agencies increasingly have a mandate to control access to their data and applications; not by firewalling their assets from view, but by managing access to properly authenticated individuals at the appropriate level of assurance. Yet while there is a large potential population of users holding strong...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.