Managing the relationships for the new ABC: Agile Business, Connected
Redesigning access controls for IAM deployments?
Data Security Intelligence – better understanding where your risks are
Facebook profile of the German Federal Government thwarts efforts to improve data protection
Gemalto feels secure after attack - the rest of the world does not
Operational Technology: Safety vs. Security – or Safety and Security?
UMA and Life Management Platforms
Adaptive Policy-based Access Management (APAM): The Future of Authentication and Authorization
UMA in the Enterprise: There’s far more potential for UMA
Minimal disclosure becoming reality
How CSPs could and should help their EU customers in adopting the Cloud
The Art of Ignorance – is it really folly to be wise?
Previous
10 11 12 13 14 15 16 Next