Computing security includes identity management to ensure proper access controls to controlled or sensitive information and permission rights for individuals to view information and data maintained by others. Security is maintained by administrators with encryption and password control and through the use of tokens or biometric devices to ensure user identity.


NewsSome banks have begun to make changes in how they activate customers’ credit-card accounts to use Apple Inc.’s new mobile-payment system after reports of fraudulent transactions, according to industry consultants.
AnalysisComplex investigations that gather data from personal devices and social media accounts can be “hit or miss.” Here are the ins and outs of real BYOD and social media investigations.
NewsA week before becoming Secretary of State, Hillary Clinton set up a private e-mail system that gave her a high level of control over communications, including the ability to erase messages completely, according to security experts who have examined Internet records.
NewsThe healthcare sector is ill-prepared for the cyber security threats that face the industry, according to research firm ABI Research.
Comments (1)
NewsAfter the recent Anthem data breach, the National Association of Insurance Commissioners says seven state commissioners will lead the cybersecurity investigation/
NewsJPMorgan Chase & Co., Lockheed Martin Corp. and Microsoft Corp. are among 32 technology, banking and retail companies urging lawmakers to pass legislation that provides legal protection for sharing hacking threats.
NewsEMC has decided against spinning off VMware, according to a published report. One potential reason why: VMware is the linchpin to EMC's software defined data center (SDDC) strategy.
NewsIBM’s Ginni Rometty on Thursday said she plans to spend $4 billion to boost sales from new businesses to $40 billion over four years, as she prepared to face investors eager to see signs of reinvention at the company.
Comments (1)
NewsBy 2018, 40% of large enterprises will have formal plans to address aggressive cybersecurity business disruption attacks, up from zero in 2015, according to new research from Gartner Inc.
NewsMedical identity theft jumped 22 percent last year as more U.S. health data becomes electronic and easier for cyber criminals to steal from doctors’ offices, hospitals and insurers.
Comments (1)
NewsInternational Business Machines Corp. formed a partnership with Juniper Networks Inc. to create networks with built-in analytics, harnessing big data to improve mobile and other applications.
NewsThe FBI said it’s close to finding the hackers responsible for the attack on health-insurance company Anthem Inc. that exposed personal data on about 80 million customers.
Twitter
Facebook
LinkedIn
Please note you must now log in with your email address and password.