Computing security includes identity management to ensure proper access controls to controlled or sensitive information and permission rights for individuals to view information and data maintained by others. Security is maintained by administrators with encryption and password control and through the use of tokens or biometric devices to ensure user identity.

TrendsResearch by McKinsey and the World Economic Forum points to a widening range of technology vulnerabilities and potentially huge losses in value tied to innovation.
CommentaryThreats to the security and privacy of patient data in the U.S. healthcare system are increasing, healthcare organizations continue to struggle with the increasingly complex federal and state privacy and security regulations, and many, if not most, providers have experienced a data breach.
NewsSecurity experts are urging consumers to change their Web passwords after the recent disclosure of a vulnerability touching wide swaths of the Internet
BlogBy outsourcing monetization to platform providers like SafeNet, Digital Businesses can manage their licensing models, extend themselves into new channels to increase their revenue and focus their attention on managing customer satisfaction.
ReportState attorneys general are investigating a data breach at a subsidiary of Experian that gave criminals access to consumers’ bank account, Social Security and drivers’ license numbers, Reuters reported Thursday.
New Product NewsContinuuity, Guavus, IBM, Looker, Others Announce New Products
SurveyOver half of Americans blame Target and Neiman Marcus for the recent data breaches suffered by their customers and think merchants should prevent future incidents, according to a national survey commissioned by Feedzai
Information Management NewsPublic and previously shared data offer potential benefits to consumers and opportunities for service providers to offer value-added services; however consumers' responses range from neutral to negative, Celent says
TrendsInfonetics Research says solutions that effectively handle mobile application control and mixed personal and business use are strong drivers for deploying mobile device security
Information Management NewsHealth care, finance and insurance are among the top five industries driving demand, according to Burning Glass Technologies; average advertised salary: $94,000
Comments (1)
Information Management NewsAccording to survey results published last week during HIMSS14, inconsistent data backup and archiving practices at hospitals are “putting data and organizations at risk and unnecessarily straining IT storage budgets.”
Comments (1)
TrendsBoardroom trends show growing importance of cybersecurity, IT background
Login  |  My Account  |  White Papers  |  Web Seminars  |  Events |  Newsletters |  eBooks
Please note you must now log in with your email address and password.