List/Grid Security Subscribe RSS feed of category Security


Using Roles for Access Control is not RBAC

I hear this kind of statement all the time:  ‘We use Roles/Groups for access control in our systems and applications so we’re RBAC’. My response is an emphatic:  ‘No ...
year of the hack

Year of the Hack

2014 will be remembered as the Year of the hack. Sony, Target, Home Depot, UPS, even Victoria couldn’t keep herself Secret.  The list of breaches is depressing. How do you avoid ...

How You Can Complement Data Security Solutions to Safeguard Your Business

Information technology can safely be classified as the backbone of all the industries that exist in today’s global economy. This development has been fuelled by the spread and acceptance ...

How To Grow Your Online Business Safely and Securely

According to The Office for National Statistics approximately one in ten retail sales made during 2014 so far has been online. By 2016, as much as 23% of UK retail sales will be made ...

Companies Battle Data Breaches

Businesses are still coping with cyber-related data theft. The breaches at luxury retailer Neiman Marcus and discount retailer Target Corp. are now chapters in modern business archives. ...
© 2014 TechSling Weblog. All rights reserved.
Designed by TechSling Online.