Identity and access management products
-
News
14 Nov 2024
Ping CEO on ForgeRock integration and future of identity
Ping Identity CEO Andre Durand discusses the company’s unified roadmap, commitment to customer stability and growth plans in the evolving identity landscape following the merger with ForgeRock Continue Reading
By- Aaron Tan, TechTarget
-
News
21 Oct 2024
Can AI be secure? Experts discuss emerging threats and AI safety
International cyber security experts call for global cooperation and proactive strategies to address the security challenges posed by artificial intelligence Continue Reading
By- Aaron Tan, TechTarget
-
News
18 Nov 2016
Three breach highlights several security issues, says (ISC)2
Customer data breaches continue to demonstrate that companies are still not treating cyber risk like every other business risk, says Adrian Davis of (ISC)2 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Nov 2016
Digital transformation not a finite process, says Martin Kuppinger
Security, privacy and identity are key to digital transformation, which is an evolutionary process, according to Martin Kuppinger Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Nov 2016
Online identity needs to be fixed, says Microsoft’s Kim Cameron
Software giant’s identity architect calls on enterprises to professionalise the way they relate to customers to help replace online identity infrastructure that is not fit for purpose Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Nov 2016
GDS aiming for 25 million users of Gov.uk Verify by 2020
Early draft of new GDS strategy reveals an ambitious target for its identity assurance service Continue Reading
By- Bryan Glick, Editor in chief
-
E-Zine
03 Nov 2016
CW ASEAN: SMEs present security weakness
In this month's CW ASEAN, we look at how the cyber security defences at small and medium-sized enterprises in Southeast Asia may have some vulnerabilities, resulting in cyber security attacks on the large corporations they work with. We also consider the need to educate users of smartphones and tablets across the region as card fraud rates rise, with high use of mobile devices considered a contributing factor. Read the issue now. Continue Reading
-
E-Zine
03 Nov 2016
CW ANZ: Using gamification to build cyber security skills
In this month's CW ANZ, we look at how PwC is using an online game to give its customers first-hand experience of what it means to face a cyber attack. We also look at how identity is gaining greater prominence in the security debate in Australia as the DTO takes the wraps off plans for a national identity system. Read the issue now. Continue Reading
-
News
01 Nov 2016
UK government re-announces £1.9bn cyber security spend
Five-year spending increase - announced by Chancellor Philip Hammond 12 months after George Osborne did so - will support new UK cyber security strategy Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
31 Oct 2016
The cyber threats lurking within every company
Insider threats have been around for a long time, but it is only recently that people have begun to acknowledge the true danger they pose Continue Reading
-
News
18 Oct 2016
Saving Lauri Love: activists plan their next move
An eclectic bunch of activists, charity workers and reformed hackers spent a rainy Sunday afternoon plotting their next move in a campaign to save Lauri Love from extradition to the US on hacking charges Continue Reading
By- Julia Gregory
-
Opinion
12 Oct 2016
Gary McKinnon: Why Lauri Love should be spared the nightmare of extradition
Computer activist Lauri Love should be spared a life sentence in a US jail, says former hacker Gary McKinnon Continue Reading
By- Gary McKinnon
-
News
19 Sep 2016
Consumers trust banks more than government for biometric security
UK citizens think banks are the best organisations to provide biometric authentication for payments Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
05 Sep 2016
Mobile device use feeds card fraud in Asean region
Card fraud is rising in Asean countries, with the high use of mobile devices a contributing factor. Continue Reading
By -
News
30 Aug 2016
Westpac bank launches Databank data protection service
Australia's Westpac bank is offering organisations that share customer data a service that it says securely locks down personal information Continue Reading
By- Stuart Kennedy
-
Opinion
28 Jul 2016
Consumer identity management is the core of real CRM
IAM + CRM is much more than simply IAM for external users, says Ivan Niccolai Continue Reading
By- Ivan Niccolai
-
News
26 Jul 2016
Government tests use of social media accounts for verifying online user identity
Online public service users may be asked to allow access to their Facebook, LinkedIn or Twitter accounts to help prove they are who they say they are Continue Reading
By- Bryan Glick, Editor in chief
-
News
12 Jul 2016
IBM sets up security centre in Canberra
IBM leads the charge as large private businesses invest heavily in security resources across Australia in an attempt to close the security gap Continue Reading
-
E-Zine
07 Jul 2016
CW ASEAN: July 2016
Lessons from the Philippine government hack: In this issue we ask why a hack on the Philippine Commission on the Elections (Comelec) was allowed to happen and what organisations in Southeast Asia can learn from this breach of security. Retailers in the region are concerned – read how the theft of customer data is their biggest worry. Continue Reading
-
E-Zine
07 Jul 2016
CW ANZ: July 2016
Australia knows it has a cyber security problem, but not the scale. In this month’s CW ANZ we describe how Australia's $230m security strategy serves as a wake-up call to enterprises. We also reveal the techniques and technologies being used to protect one Australian school, as well as a more general look at the main cyber threats to orgainsations in Australia. Read the issue now. Continue Reading
-
Feature
07 Jul 2016
The problem of passwords and how to deal with it
Security experts have long recognised passwords as inadequate, but finally technology is offering some viable alternative authentication methods that businesses can explore to keep their data safe Continue Reading
-
News
21 Jun 2016
Enterprises urged not to view security as a barrier to internet of things adoption
The Lower Colorado River Authority’s chief administrative officer urges enterprises to balance the risks of using the internet of things with the benefits connected devices can bring Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
20 Jun 2016
Lower average cost of Australian data breaches is not a sign of comfort
The average cost of a data breach to Australian organisations dropped in 2015, according to research Continue Reading
-
News
13 Jun 2016
Singapore banks adopt voice biometrics for user authentication
Banks in Singapore are rolling out biometric technology to improve customer services by speeding up the authentication process Continue Reading
By -
News
12 Jun 2016
Philippines government data breach is a warning to Asean region
Security is a rising concern in the Asean region, with fears fuelled by incidents such as the recent hacking incident in Manila Continue Reading
By -
News
19 May 2016
Gov.uk Verify to go live 24 May 2016
On 24 May 2016, the government’s identity assurance platform will move from beta to “fully live”, after missing its original April go-live target Continue Reading
By -
News
12 May 2016
IAM central to Deutsche Bank’s digital transformation
Deutsche Bank is using a centralised identity and access management (IAM) system and an application program interface (API) architecture for digital transformation Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 May 2016
Australian health sector an easy target for cyber criminals, says IBM
A push to encourage greater adoption of electronic health records has raised the spectre of online record theft Continue Reading
-
News
03 May 2016
Gov.uk Verify misses April go-live target
The Government Digital Service didn’t meet its target of taking identity assurance service Verify out of beta by the end of April, but is “nearly there”, according to programme director Janet Hughes Continue Reading
By -
News
15 Apr 2016
BBC turns micro:bit computers into IoT devices
The BBC and Nominet demonstrate a new use case for the micro:bit computer and hope to turn Britain’s schoolchildren into internet of things pioneers Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
23 Mar 2016
How to manage IT access for external users
Identity and access management has extended from being solely an internal IT management process to focus on external business engagement too Continue Reading
By -
News
23 Mar 2016
Gov.uk Verify not secure enough for NHS, says HSCIC
The government’s Verify identity verification platform isn’t secure enough for the NHS, so Liverpool Clinical Commissioning Group and HSCIC are working to add extra levels of security Continue Reading
By -
News
18 Mar 2016
Australian girls believe online harassment is endemic
There are clear signals that online threats against women and attempts to invade their privacy are becoming societal norms in Australia Continue Reading
-
E-Zine
15 Mar 2016
Robots at your service
In this week’s Computer Weekly, we find out how financial services firms are investing in artificial intelligence to create robo-advisors to help customers with financial advice online. We ask if virtual reality is ready for mainstream business adoption or is still just an over-hyped technology. And we examine the key steps needed to successfully build smart cities using internet of things and networking technologies. Read the issue now. Continue Reading
-
Feature
15 Mar 2016
IAM is the future for managing data security
Why identity and access management is taking centre stage in companies’ access policies Continue Reading
By- Andras Cser and Merritt Maxim
-
News
11 Mar 2016
Royal Mail becomes eighth accredited Gov.uk Verify provider
The Royal Mail is the latest provider to be accredited to support the government’s Gov.uk Verify identity assurance service Continue Reading
By -
Opinion
07 Mar 2016
The problem with passwords: how to make it easier for employees to stay secure
An organisation’s IT security can be compromised if staff do not follow a strict policy of using strong passwords to access internal systems Continue Reading
By- Jeremy Bergsman, CEB
-
Opinion
03 Mar 2016
Security Think Tank: Top five access control mistakes
In the modern business environment, what are the most common access control mistakes and what is the best way to correct them? Continue Reading
By- Tim Holman, 2-sec
-
News
18 Feb 2016
Mobile innovation shifts to smartphone services
As smartphone sales continue to stagnate, suppliers are looking to innovate in more novel ways Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Feb 2016
Gov.uk Verify identity system targets 50 government services for April go-live
Government identity assurance system is set to move from beta to live in April, three years after its original target date Continue Reading
By- Bryan Glick, Editor in chief
-
News
29 Jan 2016
HSBC online services hit by DDoS attack
HSBC was hit by a distributed denial of service (DDoS) attack, which targeted its online personal banking services. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
21 Jan 2016
Candy Crush maker King secures mobile access through cloud
Candy Crush maker King.com uses cloud-based Duo Security authentication for access to cloud services, customised apps and remote VPNs Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jan 2016
Most Android devices running outdated versions
Nearly a third of Android devices in enterprises today are running version 4.0 or older of the operating system, leaving them highly susceptible to vulnerabilities, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Dec 2015
Top 10 IT security stories of 2015
Computer Weekly looks back at the most significant stories on IT security in the past 12 months Continue Reading
By- Warwick Ashford, Senior analyst
-
Guide
07 Dec 2015
Essential guide to data breaches, the dark web and the hidden data economy
In this guide, we look at the aftermath of a data breach - what do cyber criminals use that stolen data for, and what can companies do to avoid becoming a victim? Continue Reading
-
News
27 Nov 2015
Word ‘smart’ being abused by IoT advocates
Speakers at an event hosted by Cambridge Wireless say the term ‘smart’ is overused to describe connected devices on the internet of things Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
23 Nov 2015
Technology helping to deliver aid for refugees
In this week's Computer Weekly, we find out how technology is helping to deliver vital aid to Syrian refugees in the Middle East. We look at the barriers to achieving the government's aim of a paperless NHS. And the CTO of special effects studio Framestore talks about the IT challenges behind hit movies such as Gravity. Read the issue now. Continue Reading
-
News
29 Oct 2015
M&S data breach forces retailer to temporarily suspend service
A glitch that allowed online customers to see each others' details forced retailer Mark & Spencer to take its website offline while it resolved the issue Continue Reading
By- Clare McDonald, Business Editor
-
E-Zine
19 Oct 2015
IT giants Dell and EMC unite
In this week's Computer Weekly, Dell's proposed $67bn acquisition of EMC would be the biggest in the history of IT – we assess the implications. £175bn of IT outsourcing contracts come up for renewal in the next three years- what are your options? And we hear from IT leaders about security and the internet of things. Read the issue now. Continue Reading
-
Feature
15 Oct 2015
The true cost of a cyber security breach in Australia
The costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading
-
News
09 Oct 2015
Lack of trust for banks causes NHS rethink over government online identity scheme
NHS trials of the Verify ID assurance system found patients concerned over using banks to allow access to medical data Continue Reading
By -
News
08 Oct 2015
Estonian government IT initiative increases virtual population
Estonia is leading the way when it comes to providing easy and secure access to government services for citizens and foreigners alike Continue Reading
By- Tarmo Virki
-
Photo Story
06 Oct 2015
Aid organisations using technology to help Syrian refugees in the Middle East
Technology is playing a crucial role in supporting humanitarian aid organisations coping with the influx of Syrian refugees in the Middle East Continue Reading
By -
Feature
01 Oct 2015
How technology is helping deliver aid to Syrian refugees in the Middle East
The Syrian refugee crisis has engulfed the Middle East, but technology is proving to be an essential tool to help aid organisations support displaced people Continue Reading
By -
News
14 Sep 2015
RSA Group flags ID theft risk to Lloyds Bank customers following datacentre storage theft
International insurance group has seen 500 customers take up offer of identity theft protection in wake of datacentre theft Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
09 Sep 2015
Conventional security measures hit productivity, study shows
Most IT professionals say context-aware security would improve productivity without compromising security, a survey from Dell reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Aug 2015
Mobile phone users at risk as hackers bug and track victims
An investigation by Australian TV show 60 Minutes demonstrates how hackers based thousands of miles away in Germany were able to record the calls of an Australian senator and track his movements Continue Reading
By- Ross Coulthart, 60 Minutes Australia
-
News
03 Aug 2015
Why the time is ripe for security behaviour analytics
Recent months have seen an uptick in announcements by security suppliers around behavioural analytics, but what is driving this trend? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Jul 2015
GDS targets three million new users of Gov.uk Verify service in next 12 months
Roll-out of the system for logging in to digital public services is taking longer than expected, but user numbers are expected to grow significantly in 2015 Continue Reading
By- Bryan Glick, Editor in chief
-
News
07 Jul 2015
Dashlane bullish about the future despite LastPass hack
Password management firm Dashlane is confident its business model will evolve and continue to be relevant even if passwords eventually disappear Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 Jun 2015
Pharmaceutical companies use BPM to cut cost of clinical trial drugs
Pharmaceutical companies have developed an IT system to secure the supply of medicines they need for clinical studies, saving hundreds of thousands on their drugs bill in the process Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
22 Jun 2015
Government Digital Service insists Verify safe despite claims of vulnerabilities
An academic paper suggests the Gov.uk Verify system could be used as a spy network, but the Government Digital Service (GDS) insists this is not the case Continue Reading
By- Clare McDonald, Business Editor
-
News
12 Jun 2015
Government preparing to let private sector companies use its Verify identity scheme
The Cabinet Office is talking to banks, insurers and retailers to establish Gov.uk Verify identity assurance as a national scheme Continue Reading
By -
News
03 Jun 2015
VMware puts network virtualisation to work in McAfee environments
VMware announces an integrated system to automate distribution and enforcement of McAfee’s network security platform using its NSX network virtualisation system Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 May 2015
Data classification key to IP protection, says Titus
Data classification can help organisations get more value out of encryption and data loss prevention systems Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 May 2015
Google announces security features for Android
Google announces better app permission controls and other Android security changes at its Google I/O developer conference Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 May 2015
Wi-Fi Global Congress: Hotspot 2.0 standard addresses wireless security holes
At Wi-Fi Global Congress, Ruckus Wireless announces it will be first to market with the second release of Hotspot 2.0 Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 May 2015
PSNGB rebrands to drive information sharing across PSN
PSNGB, the trade association set up to promote the Public Services Network, rebrands itself as Innopsis and says its work is far from over Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 May 2015
Future IAM will need to be broader, says Martin Kuppinger
Identity and access management systems need to look at all forms of identity, not just employees or users, says KuppingerCole analyst Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Apr 2015
Time to embrace a new level of IAM, says Martin Kuppinger
A new level of identity and access management is at hand, yet many businesses still rely on usernames and passwords Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
25 Apr 2015
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
Always a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading
-
E-Zine
20 Apr 2015
The future of Moore's Law at 50
In this week's Computer Weekly, Moore's Law – the seminal forecast by Intel founder Gordon Moore that oversees technology development – is 50 years old. We look at its modern relevance and future implications. IT chiefs discuss whether Windows is still core to their strategy. And we look back at five years of government IT. Read the issue now. Continue Reading
-
News
08 Apr 2015
Exit checks system for UK borders finally goes live
The Home Office launches a system for making exit checks of travellers at UK borders, following the scrapped e-Borders programme Continue Reading
By- Bryan Glick, Editor in chief
-
News
25 Mar 2015
UK government adds five authentication providers to Gov.uk Verify identity management system
The Government Digital Service (GDS) adds five authentication providers to the Gov.uk Verify identity and access management scheme Continue Reading
By- Clare McDonald, Business Editor
-
News
27 Feb 2015
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system Continue Reading
-
News
20 Feb 2015
BlackBerry 10.3.1 review: Access Android apps and Blend
BlackBerry has finally released version 10.3.1 of its mobile operating system, which gives access to the Amazon Android app store Continue Reading
By- Cliff Saran, Managing Editor
-
News
02 Feb 2015
Former Capital One data analysts charged with mining customer data
US financial services regulator SEC charges two former employees of financial services firm Capital One with insider trading Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
17 Dec 2014
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
17 Dec 2014
US interception in the EU faces new legal challenges
US government orders against Microsoft to hand over email data 'infringes privacy legislation' in other countries Continue Reading
By- Fiona O’Cleirigh
-
E-Zine
08 Dec 2014
The most influential people in UK IT 2014
In this week's Computer Weekly, we unveil the 50 most influential people in UK IT for 2014, and interview the winner of our UKtech50 list, Unilever's global CIO, Jane Moran. We examine how Cisco is responding to software-defined networking. And we hear from IT chiefs successfully implementing identity and access management. Read the issue now. Continue Reading
-
News
28 Nov 2014
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
14 Nov 2014
The business challenges and benefits of identity and access management
IT leaders gathered at a CW500 Club meeting to hear from peers about the challenges of identity and access management Continue Reading
By- Bryan Glick, Editor in chief
-
News
07 Nov 2014
Home Depot traces credit card data hack to supplier compromise
US retailer Home Depot reveals its recent data breach was linked to a compromised supplier’s credentials Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Oct 2014
Half a million citizens to be using Gov.uk Verify by April 2015
Government now expects to have nearly half a million people using its Gov.uk Verify service for online identity assurance by April 2015 Continue Reading
By- Bryan Glick, Editor in chief
-
E-Zine
27 Oct 2014
Securing critical industrial systems
In this week’s Computer Weekly, we examine the security threats to the industrial control systems that power the UK’s critical national infrastructure, and ask what can be done to better protect them. We look at the key considerations when choosing an infrastructure as a service supplier. And we compare six of the top hybrid flash array products from the leading storage hardware providers. Read the issue now. Continue Reading
-
News
15 Oct 2014
Gov.uk Verify identity assurance service ready to go live
Government expected to launch first service using digital identity assurance in "next couple of weeks" Continue Reading
By- Bryan Glick, Editor in chief
-
News
10 Oct 2014
Azure CTO Mark Russinovich's top ten public cloud security risks
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
08 Oct 2014
Malware being used to steal cash from ATMs
Criminals are using malware to steal cash from ATMs without debit and credit cards Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
29 Sep 2014
Hacking IT from the inside
In this week’s Computer Weekly, car giant Daimler talks about its IT security strategy and the benefits of having its own in-house hacking team. App developers are under fire for collecting too much personal data – we examine the latest best practice. Our new buyer’s guide looks at virtualisation backup. And our review of Microsoft’s Surface Pro 3 tablet asks whether it can replace the laptop. Read the issue now. Continue Reading
-
News
16 Sep 2014
GDS unveils 'Gov.UK Verify' public services identity assurance scheme
The Government Digital Service (GDS) debuts a system to prove users’ identities when using public services online, branded as 'Gov.UK Verify' Continue Reading
By- Bryan Glick, Editor in chief
-
News
11 Sep 2014
Google denies breach after hackers leak millions of user logins
Google denies claims cyber criminals stole users' data and downplays the threat after a hacker purportedly leaked 4.9 million Gmail logins Continue Reading
-
News
05 Sep 2014
Barclays bank launches biometric authentication
Barclays bank plans to launch biometric readers that read users' finger veins to authenticate customers Continue Reading
By- Clare McDonald, Business Editor
-
News
21 Aug 2014
Load balancing supports Kent County Council's VDI project
Kent County Council picks Kemp Technologies load balancers to support a deployment of VMware Horizon View and Workspace across its estate Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
18 Aug 2014
What ingredients go into the successful app store?
An enterprise app store should provide the controlled availability of apps for employees.We look at what is available for organisations to use Continue Reading
By- Bernt Ostergaard , Quocirca
-
News
01 Aug 2014
Fingerprint scanners most popular alternative to banking passwords
Fingerprint scanning technology is the most favoured biometric security alternative to passwords for UK bank customers Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
31 Jul 2014
Paddy Power hit by data breach in 2010
Gambling firm Paddy Power owns up to 2010 data breach after recovering a compromised dataset in Canada Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Jul 2014
Tackle IAM with a risk-based approach, says KPMG
A risk-based approach is the best way to tackle identity and access management, says KPMG Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Jul 2014
Why using voice biometrics is a good idea
Banks and other organisations are turning to voice biometrics, but why do they believe the technology is good idea? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Jul 2014
Barclays passes government’s ‘internet-born threat’ test
Barclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit Continue Reading
-
News
01 Jul 2014
Most people keen to share biometric data for smoother travel
A study has revealed that 89% of citizens agree with the use of biometric identification to aid travel Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
24 Jun 2014
Benefits of accessing data outweigh privacy risks for chronically ill
Over half of UK patients with chronic health conditions want access to their medical records and believe the benefits outweigh privacy risks Continue Reading
-
News
17 Apr 2014
Datacentre lessons learnt from Heartbleed bug
The Heartbleed bug, an OpenSSL flaw affecting millions of websites, has some lessons for datacentre providers and operators Continue Reading
By- Archana Venkatraman, Datacentre Editor