New research shows most apps used for mobile authentication have serious vulnerabilities, even if hardware security is used. Digitization is driving demand for strong digital identities. A recent McKinsey survey1…
Deep Dive
-
-
The final version of Microsoft’s security configuration baseline settings for Windows 11 is now available for download via the Microsoft Security Compliance Toolkit. Microsoft security consultant Rick Munck said “Two…
-
Helping businesses address sustainability objectives and climate risk, IBM Environmental Intelligence Suite combines weather, climate, and operational data and environmental performance management into a single solution. IBM today announced a…
-
By Raj Sundaresan, CEO, Altimetrik Unlock new business models with digital business enablement Digital transformation typically stagnates because it is perceived as too disruptive or expensive. A lesson many organizations…
-
By Nikhil Korgaonkar, Regional Director, Arcserve India & SAARC Ransomware is now one of the most potentially damaging — and prevalent — types of malware. With this lucrative crime, hackers…
-
After warning more than 14,000 Gmail users that they may have been targeted in a state-sponsored phishing campaign, Google will issue 10,000 “high-risk” users with free hardware security keys. Shane…
-
VMware has announced a partnership with Intel at VMworld 2021 to deliver security, maintenance and intelligent analytics for commercial PCs. Integrating Intel vPro platform technology with VMware Workspace ONE cloud…
-
ASG-Enterprise Orchestrator and ASG-Zena Now Support Deployment Through Docker Containers
by CIO AXISContainerized delivery of solutions to streamline software updates; improve usability through new integrations with Ansible and Xray ASG Technologies, a Rocket Company and leading provider of solutions for the information-powered…
