The Latest in IT Security

Posts Tagged ‘risk assessment’

Cloud, the Internet of Things (IoT), mobile and digital business initiatives have broadened the surface and increased the complexity of identity and access management (IAM) environments. With millions of entitlements to manage across thousands of users and hundreds of applications, organizations are struggling to keep their access risks in check. Today’s environments have become so […]

Read more ...

Operational Risk Assessments: Not Glamorous, But Indispensable PUNTA CANA – KASPERSKY LAB SECURITY ANALYST SUMMIT – It may not be the most glamorous security role, but when it comes to operational risk assessment, someone has got to do it. In a room filled with some of information security’s rock stars, and at a conference where […]

Read more ...


SATURDAY, MAY 30, 2020

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments