Computing security includes identity management to ensure proper access controls to controlled or sensitive information and permission rights for individuals to view information and data maintained by others. Security is maintained by administrators with encryption and password control and through the use of tokens or biometric devices to ensure user identity.


NewsThe Internet of Things (IoT) will redefine how businesses manage identity and access management (IAM), according to Gartner Inc.
What were the biggest hacks, security breaches, malware and IT nightmares of 2014? Continuum, which specializes in IT management software and network operations center (NOC) support, offered up 10 big issues from the past year. Here’s the countdown plus our perspectives.
NewsThe global market for services based on gesture and biometric interface technologies will be worth an estimated $1.2 billion by 2019, up from less than $2 million this year, according to a report from Juniper Research.
NewsThe 2015-2020 Federal Health IT Strategic Plan just released by the Office of the National Coordinator for HIT is about “collecting, sharing, and using electronic health information.” Translation: The government is pursuing IT, data and system interoperability.
NewsEnterprise architecture sounds like a good idea. But in the real world of gotta-get-it-done IT projects, it can often seem like an annoying obstacle rather than a strategic asset. Here's how CIOs can prioritize.
NewsHackers are increasingly stealing directly from banks and other companies and helping organized crime to operate more efficiently, according to the chief of cyber-security firm Kaspersky Lab.
Each year, the National Association of State Chief Information Officers (NASCIO) conducts a survey to identify the top policy and technology issues facing state government. The resulting list is particularly interesting, especially when compared/contrasted to corporate CIO priorities.
NewsOptimism about business growth and a rising sense of alarm at security breaches are shaping U.S. banks' tech spending plans for 2015.
NewsHackers with Wall Street expertise have stolen merger-and-acquisition information from more than 80 companies for more than a year, according to security consultants who shared their findings with law enforcement.
NewsToday's healthcare organizations are at greater risk of a cyber attack than ever, in part because electronic health information is more widely available today than in the nearly 20 years since the Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996, according to a report from IDC Health Insights.
NewsInformation security professionals in general want a single, comprehensive endpoint security system, but endpoint security deployment typically is tactical and driven more by firefighting than strategy, according to a new report from research firm Enterprise Strategy Group (ESG).
NewsTarget Corp. is asking a federal judge to throw out claims by banks that had to deal with the consequences of a data breach that compromised at least 40 million credit-card accounts.
Twitter
Facebook
LinkedIn
Please note you must now log in with your email address and password.