Computing security includes identity management to ensure proper access controls to controlled or sensitive information and permission rights for individuals to view information and data maintained by others. Security is maintained by administrators with encryption and password control and through the use of tokens or biometric devices to ensure user identity.

Information Management NewsGartner forecasts increased growth in security spending, including capabilities delivered by a range of software and services
Comments (2)
Information Management NewsJPMorgan customers were targeted with a phishing scam earlier this week aimed at obtaining online banking credentials.
Information Management NewsResearch firm ABI estimates data loss prevention market to reach $1.7 billion by year end
Comments (2)
CommentaryDeloitte research finds that financial services is the industry most targeted by cyber criminals.
Comments (1)
Information Management NewsA gang of hackers in Russia has amassed 1.2 billion sets of looted user names and passwords, according to a U.S. security company that said it's the largest known cache of stolen personal information.
Comments (1)
Information Management NewsThey haven't caught much media attention lately, but distributed denial of service attacks continue to take place and have become larger, researchers analyzing the latest attack patterns say.
Comments (1)
Information Management's DM RadioEstimates for the potential percentage of online accounts that are fake range from the low teens to upper 20s. Emails, Facebook pages, Twitter handles, and even more serious types of business accounts are plagued by fraud these days. What can you do to protect against Internet forgeries? Register for this episode of DM Radio to find out!
Information Management NewsThird parties manage 70 percent of private systems, and that figure is on the rise, according to a report from Technology Business Research.
Comments (1)
Information Management NewsWith millions of malware strains targeting mobile devices today, bank CEOs and their security chiefs are understandably anxious. Here's a look at several defensive moves banks can make.
CommentaryHealthcare leaders who have properly instituted an information security awareness and training program — and integrated it enterprise-wide — have positively influenced their organizational culture in the right direction, writes blogger Brian Evans.
Information Management NewsSecurity and risk leaders need to engage with the latest technology trends to manage risks, says Gartner
Information Management NewsAdvice on some of insurance IT executives' biggest challenges, including data security, cloud computing, and recruiting and retaining talent was offered during a town hall meeting at last week’s IASA conference.
Login  |  My Account  |  White Papers  |  Web Seminars  |  Events |  Newsletters |  eBooks
Please note you must now log in with your email address and password.