Computing security includes identity management to ensure proper access controls to controlled or sensitive information and permission rights for individuals to view information and data maintained by others. Security is maintained by administrators with encryption and password control and through the use of tokens or biometric devices to ensure user identity.


NewsPresident Barack Obama will create a way for companies to voluntarily share information about computer-network threats while he awaits congressional action on cybersecurity legislation.
NewsThe top executives of Google Inc., Yahoo! Inc. and Facebook Inc. won’t attend President Barack Obama’s cybersecurity summit on Friday, at a time when relations between the White House and Silicon Valley have frayed over privacy issues.
NewsHowever, research from the New York Department of Financial Services found that actual data loss is not a common outcome of compromised systems.
NewsDigital business executives have found a new way to engage with their customers.
NewsPresident Barack Obama’s plan to create a new agency to combat hackers may improve information sharing between government and industry, although it adds to a security bureaucracy that some have warned has already grown unwieldy.
NewsDeloitte LLP named Cathy Engelbert to be the first woman leading a Big Four consulting-and-accounting firm in the U.S. as clients confront tighter financial regulations and cyber risks.
NewsTwitter Inc. said government requests for user data and content removal jumped in the second half of 2014, especially in Russia, Turkey and the U.S.
NewsIf you're an Anthem customer, be extra wary of phone calls and emails you receive following the health insurer suffering a massive hack.
NewsAnthem Inc., the second biggest U.S. health insurer by market value, said hackers obtained data on tens of millions of current and former customers and employees in a sophisticated attack that has led to a Federal Bureau of Investigation probe.
NewsCongress held its first hearing on President Obama’s proposal for a national breach notification standard on January 27. Testimony primarily from retail and technology trade associations supported much of the plan, but support was lacking for the provision to notify individuals within 30 days of discovering a breach.
NewsWhile the growth of Internet-connected medical devices and wearable fitness products can potentially improve health outcomes, the technology also raises serious privacy and security concerns that could undermine consumer confidence.
NewsSAP SE is trying to marshal Apple, Microsoft and other big business technology companies to gather hacker-fighting intelligence following a spate of security problems with open-source software.
Twitter
Facebook
LinkedIn
Please note you must now log in with your email address and password.