Writing modern, secure, identity enabled apps is a non-trivial undertaking. Customers demand or assume modern mobile or web apps allow
Posted by Neil Thacker, Deputy CISO Forcepoint As the majority of IT and security professionals will be well aware, the European
Attractive benefits, flexible working hours and multiple career opportunities define a better work-life balance, it’s therefore no wonder that the
Lookout recently released information about a new spyware family called SonicSpy. Lookout Security Intelligence researchers discovered the spyware in Google
As the number of consumers with mobile devices continues to rise, so too does the demand for reliable internet access.
Segmenting Your Customer Data According to marketing guru Professor Malcolm McDonald “Correct needs-based segmentation is the bedrock of commercial success”.
By Gabriel Wilson; Managing Consultant, Rivington Information Security, written in conjunction with Identity and Access Management specialists Ilex International Managing