Asia's Source for Enterprise Network Knowledge

Sunday, May 28th, 2017

Identity and Access Management

HID Global, forecasts a shift in the use of identity technology that will lead to increased...
Empowering the patient There is serious personal risk associated with a healthcare data breach,...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
Identity management vendor Okta and Google have announced a partnership aimed at getting...
News
The traditional meaning of people “getting taken for a ride” is that they are victims...
Financial institutions and online service providers are engaging customers via a widening array of...
Two prevailing industry trends are driving a new perspective regarding applications –...
The quest for business agility, availability, collaboration and cost savings, among other...
News
Earlier this month, Check Point Software released its 2015 security report which found that mobile...
Security researchers’ recent discoveries of a vulnerability in the internet-connected...
Ixia takes a look at some of the urgent new security threats facing companies and what companies...

WhitePapers

In the summer of 2016, a unique coalition was formed to address the rapid...
  Understanding and managing risk in the software supply chain is more...
Skybox were contracted by the world's largest, exclusively online bank to...