Computing security includes identity management to ensure proper access controls to controlled or sensitive information and permission rights for individuals to view information and data maintained by others. Security is maintained by administrators with encryption and password control and through the use of tokens or biometric devices to ensure user identity.


NewsThe past year has been a busy one for the mobile technology market, as organizations continue to ramp up their bring-your-own-device (BYOD) programs and roll out smartphones, tablets and other products to their more mobile employees. Here are five top developments and trends that we covered in 2014.
NewsWhen it comes to health data breaches, 2014 was a milestone year. Healthcare organizations accounted for about 42 percent of all major data breaches reported this year, according to the Identity Theft Resource Center.
Data ManagementHow to minimize the time, cost and legal risk associated with e-Discovery.
NewsNorth Korea’s access to the Internet has been hit with outages and is offline today, according to a network-monitoring company, days after the U.S. government accused the country of hacking into Sony Corp.’s files.
NewsPresident Barack Obama said the U.S. will respond to North Korea’s cyber-assault on Sony Pictures Entertainment “in a place and time and manner that we choose,” adding that he thought the studio made a mistake by canceling the release of a movie linked to the attack.
NewsA Staples malware hack may have lifted 1.16 million payment cards from point of sale systems at 115 of the retailer's roughly 1,400 U.S. stores. The admission arrives as U.S. businesses and the federal government struggle to mitigate and counter such attacks.
NewsThe Internet of Things (IoT) will redefine how businesses manage identity and access management (IAM), according to Gartner Inc.
What were the biggest hacks, security breaches, malware and IT nightmares of 2014? Continuum, which specializes in IT management software and network operations center (NOC) support, offered up 10 big issues from the past year. Here’s the countdown plus our perspectives.
NewsThe global market for services based on gesture and biometric interface technologies will be worth an estimated $1.2 billion by 2019, up from less than $2 million this year, according to a report from Juniper Research.
NewsThe 2015-2020 Federal Health IT Strategic Plan just released by the Office of the National Coordinator for HIT is about “collecting, sharing, and using electronic health information.” Translation: The government is pursuing IT, data and system interoperability.
NewsEnterprise architecture sounds like a good idea. But in the real world of gotta-get-it-done IT projects, it can often seem like an annoying obstacle rather than a strategic asset. Here's how CIOs can prioritize.
NewsHackers are increasingly stealing directly from banks and other companies and helping organized crime to operate more efficiently, according to the chief of cyber-security firm Kaspersky Lab.
Twitter
Facebook
LinkedIn
Please note you must now log in with your email address and password.