Case Studies | Communication | Cyber Security | Information | Security | Technology | November 11, 2015
Why dedicated workplace mobile devices are vital to information security
The use of mobile devices in the workplace is the new normal for employees of…

Cloud Computing | Cyber Security | Information | Movers & Shakers | Reports | Security | Technology | November 9, 2015
(ISC)2 Advisory Council Member Prof. Jill Slay Selected as InfoSec Educator of the Year by Australia Information Security Association
Internationally-Recognized Educator and Cybersecurity Expert Named Inaugural Award Recipient (ISC)² (“ISC-squared”) has announced that its Asia-Pacific…

Big Data | Case Studies | Cloud Computing | Communication | Cyber Security | Data Centres | Information | Reports | Security | Technology | November 9, 2015
29% of us take our phones into the bathroom, despite the risk of being hacked or spied on
The relationship between users and their digital devices is often closer than that of best…

Big Data | Cloud Computing | Communication | Cyber Security | Data Centres | Information | Security | Technology | November 9, 2015
Centrify partners with leading Cloud Access Security Brokers to enhance cloud security for SaaS applications
Centrify has formed technology integration partnerships with five leading cloud access security brokers (CASBs): CloudLock,…