In this white paper, uncover the security cracks of mobile and cloud computing that IAM has exposed. View now to explore the state of IAM technology and what you can do to strengthen your strategy. Learn how to protect your data from external and internal threats with proper provisioning and administration controls.
The following research report focuses on the use of electronic payment systems, perceptions about the risk to organizations and trends in the adoption as well as support for virtual currency solutions. Read on to learn more.
In this case study, learn how one university was able to mitigate risk and vulnerabilities by taking advantage of a leading app scanning platform. Read on to explore how this platform enables the university's apps to comply with regulations and if it may be right for your organization.
This article in our Royal Holloway Information Security Thesis Series looks at possible extensions of a process algebra language used to support modelling of smart transport ticketing systems.
In this white paper, learn the expected security challenges your company may face in the next 5 years. Read on to uncover tips and best practices for securing your organization against these threats.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines