Federal authorities have arrested a Chinese professor, accusing him of pilfering trade secrets from the computer systems of American high-tech companies where he and a co-conspirator once worked.
Breaches like the Target breach of 2013 and the recent "Heartbleed" bug may give you the impression that breaches are just an electronic problem but they aren't. It's impossible for you to personally protect your data everywhere. Comprehensive identity theft protection from LifeLock helps safeguard your finances,...
To improve security and ensure compliance with industry regulations, Colt Technology Services needed a streamlined way to provision and govern access for both general and privileged users to 19,000 systems.
With the combination of Dell Identity Manager and Dell Privileged Password Manager, Colt was able to achieve...
Privileged accounts are a necessity in any enterprise IT environment, since they enable administrators to manage the environment. But as news reports constantly remind us, granting privileged access increases the risk of a security breach, no matter what industry your organization represents. However, your...
In an ideal world, we'd have the budget and time we need to get things done. And tomorrow would be predictable. But that's simply not the case, especially in the IT universe. As you well know, the world of identity and access management (IAM) is one of constant change, shrinking deadlines, minuscule budgets, overtaxed...
In an ideal world, we'd have the budget and time we need to get things done. And tomorrow would be predictable. But that's simply not the case, especially in the IT universe. As you well know, the world of identity and access management (IAM) is one of constant change, shrinking deadlines, minuscule budgets, overtaxed...
In an ideal world, we'd have the budget and time we need to get things done. And tomorrow would be predictable. But that's simply not the case, especially in the IT universe. The world of identity and access management (IAM) is one of constant change, shrinking deadlines, minuscule budgets, overtaxed staff and...
Thanks to the huge proliferation of mobile devices, millions now take their online shopping, banking, socializing and their jobs on the go. But this always-connected lifestyle has come at a steep price, as a new breed of sophisticated criminals has learned how to exploit those users' mobility to harvest personal data...
To improve efficiency and ensure the IT service desk could accommodate the growing business, Hiscox wanted to automate its manual user-provisioning processes. It also wanted to tighten security and ensure proper separation of duties (SOD).
With ActiveRoles Server, Hiscox saved service desk time averaging 75 percent...
IT security today is an illusion. We spend more and more on security software and compliance processes, yet every week we hear about another company losing corporate emails or exposing their customers' personally identifiable information to disgruntled insiders or ever-more sophisticated hackers.
With the explosion...
Does your organization have more applications today than even just a year ago? And are you finding that managing permissions for those applications is more difficult - far more difficult - than it used to be? Does achieving regulatory compliance seem impossible?
The root of the problem likely lies in your...
Did information security expert Chris Roberts exploit vulnerabilities in airplanes' onboard entertainment systems, allowing him to access a plane's thrust management computer and cause it to climb?
An army of 40,000 small office/home office routers have been exploited by automated malware. But who's responsible for devices being vulnerable: vendors for using well-known defaults; or distributors and IT managers for not locking them down?
Penn State University's College of Engineering computer network has been victimized by two sophisticated cyberattacks, with at least one originating from China.
Security vulnerabilities in certain infusion pumps manufactured by Hospira could allow an unauthorized user to alter the dose the devices deliver, the FDA warns. Just a few months ago, the FDA issued a medical device security guide.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.