Computing security includes identity management to ensure proper access controls to controlled or sensitive information and permission rights for individuals to view information and data maintained by others. Security is maintained by administrators with encryption and password control and through the use of tokens or biometric devices to ensure user identity.


NewsTwitter Inc. said government requests for user data and content removal jumped in the second half of 2014, especially in Russia, Turkey and the U.S.
NewsIf you're an Anthem customer, be extra wary of phone calls and emails you receive following the health insurer suffering a massive hack.
NewsAnthem Inc., the second biggest U.S. health insurer by market value, said hackers obtained data on tens of millions of current and former customers and employees in a sophisticated attack that has led to a Federal Bureau of Investigation probe.
NewsCongress held its first hearing on President Obama’s proposal for a national breach notification standard on January 27. Testimony primarily from retail and technology trade associations supported much of the plan, but support was lacking for the provision to notify individuals within 30 days of discovering a breach.
NewsWhile the growth of Internet-connected medical devices and wearable fitness products can potentially improve health outcomes, the technology also raises serious privacy and security concerns that could undermine consumer confidence.
NewsSAP SE is trying to marshal Apple, Microsoft and other big business technology companies to gather hacker-fighting intelligence following a spate of security problems with open-source software.
NewsThe shortage of in-house security expertise is compelling many organizations worldwide to turn to professional security services, according to research from Frost & Sullivan. Also contributing to market demand is the endless progression in sophisticated advanced persistent cyber threats, the report says.
NewsProposed cybersecurity legislation from the White House may compel a major change in the HIPAA breach notification rule.
NewsThe vast majority of IT and security managers concede they don't know the number of shadow IT cloud apps within their organization -- which employees use without corporate IT's approval.
NewsIBM's new z13 mainframe system boasts improvements including the ability to perform data analytics on the machine itself, which IBM say can deliver insights faster and cheaper.
NewsCIOs now must track the use of workers’ own devices and applications and decide which of these programs to roll out companywide. That’s a break from the past, when they had more control over evaluating what software and hardware to buy before it reached the staff.
NewsPresident Barack Obama’s renewed push this week to protect U.S. computer networks from hacking was welcomed by industry leaders, though it lacks the financial incentives companies have been seeking.
Twitter
Facebook
LinkedIn
Please note you must now log in with your email address and password.