The reason business and IT have a disconnect around identity and access management (IAM) is because IAM is seen as a security control, rather than enabling agile business models (Access management projects...
Season One: Empowering the remote working revolution
Zoom denies claims that its service is a security risk
Microsoft releases early preview of 'hardware-enforced stack protection' feature for Windows 10 Insider previews builds
Hardware-enforced stack protection uses a combination of modern CPU hardware and 'shadow stacks' to protect app code from cyber attacks
Ian Hill of BAM Group warns against being distracted by bells and whistles
The launch of Apple’s upgraded entry-level iPhone SE2 has been pushed back from this month into the second quarter