ANALYSIS We all know that the majority of “breaches” are caused by human error, intentional or not. We also know that passwords are among the weakest form of access management.
Centrify has introduced the first cloud-based federated privileged access service to secure organisations' systems when using outsourced IT.
Cybercriminals have been targeting businesses and the exposure of millions of personal identities has made digital Identity, and its secure management, a significant area of concern for all organisations
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]