Management and security, always a troublesome twosome, have reared their ugly heads yet again. This time, they’re causing problems for virtualization initiatives, quashing deployment plans while IT ...
One of the biggest mistakes that low-performing security education programs make is treating security awareness training as if every user impacts security in exactly the same way. Everyone gets the ...
Controlling the actions of privileged users is the cornerstone of just about every compliance regulation. I was speaking about the chances of this approach becoming a really effective approach to ...
Privileged IT staffers literally holds the keys to the castle. Access to those keys that open the doors to critical operating system and application resources must be carefully managed and legally ...
Adam Stone writes on technology trends from Annapolis, Md., with a focus on government IT, military and first-responder technologies. For state and local government, that’s especially concerning when ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results