Tech leaders detail security strategies
The threat of cyberattacks continues to overwhelm many organisations, and it’s simply not a matter of ‘if’ but ‘when’ corporate networks will be breached by hackers.
The threat of cyberattacks continues to overwhelm many organisations, and it’s simply not a matter of ‘if’ but ‘when’ corporate networks will be breached by hackers.
Microsoft's strategy for providing customers with identity management options is increasingly reliant on cloud-based methods of authentication and access control for provisioning of Windows-based mobile devices as well as Apple iOS and Google Android devices.
Microsoft is thinking about buying an Israeli security company that yesterday posted instructions on how to change Active Directory passwords by exploiting a design flaw.
Likewise Software has released a new version of its open-source authentication software for allowing Linux, Apple Macintosh and commercial Unix-based computers to hook into Microsoft Active Directory controlled servers and networks.
An Australian tech startup has filled a missing piece of the open source Mono .Net application environment by integrating it with Microsoft's Active Directory server.