A security flaw was disclosed today in Adobe Systems Inc.s Version Cue software—the second security flaw in the companys software discerned during the last...
In an effort to bolster supply chain security for big retail and government customers, software developer Columbitech has added RFID support to its wireless...
Microsoft is investigating another critical hole in its Internet Explorer Web browser.
The hole, if left unpatched, could allow remote attackers to take control of...
IBM and Microsoft Corp., along with a small fleet of partners, will submit in September three new security specifications to OASIS: WS-SecurityPolicy, WS-SecureConversation and...
Courion Corp. identity management and provisioning tools have helped SunTrust Banks Inc. create staff efficiencies while reducing both data entry errors and the time...
After being stung by high-profile cases of data theft, prominent colleges and universities are at the forefront of efforts to improve network security while...
Identity 2.0 from Trusted Network Technologies Inc. is an appliance and software combination that effectively controls access to servers and applications while also providing...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...