77 results on '"COMPUTER access control"'
Search Results
2. Applications: Getting to yes.
3. The Big Personal Hack That Almost Happened.
4. Microsoft Adds New AI Capabilities to Word, PowerPoint.
5. USB Type-C to Become More Secure With Authentication Standard.
6. What Enterprises Can Expect for Cybersecurity in 2019.
7. Top Five Reasons Why Kubernetes Is Changing the Cloud Landscape.
8. Kubernetes Security Authentication Moving Forward With SIG-Auth.
9. Orkus Launches Access Governance Platform for Cloud Security.
10. OneLogin Improves Access Flow in its Security Platform.
11. How User Permissions Enable Developers to Read Your Company's Email.
12. Twistlock Extends Container Security to Protect Serverless Functions.
13. Nuance Biometric Security Turns Your Body Into an Authentication Tool.
14. IBM Discovers Business Email Compromise Attack Tied to $5M in Loses.
15. U.S. Government Turning to DMARC for Better Email Security.
16. Twitter Expands Two-Factor Authentication Security Options.
17. EAP-TLS Detailed as WiFi Security Best Practice at SecTor.
18. Oracle Patches 308 Vulnerabilities in July Critical Patch Update.
19. RSA's Innovation Sandbox Reveals Next Set of Hot Security Startups.
20. Facebook Delegated Recovery Protocol Offers New Password Reset Option.
21. Google Uses Multi-Layered Controls to Protect Data in the Cloud.
22. Resolve to Follow These 8 Steps for Better Data Security in 2017.
23. 8 Best Practices for Keeping Your Database Secure.
24. Twitter's Breach That Wasn't Prompts New Security Rules.
25. Graduation 2016: 5 Tips to Get an 'A' in IT Security.
26. The State of Google Security in 2016.
27. LinkedIn's 2012 Breach Still Puts Users at Risk.
28. 10 Mobile Security Vulnerabilities and How to Address Them.
29. Huge Credential Leak Underscores Need to Protect Passwords, Login IDs.
30. Verizon: Old Flaws, Weak Passwords Lead to Breaches.
31. Google Extends Single Sign-On Support for Hundreds of Apps.
32. ScriptRock Rebrands as UpGuard With More Focus on Security.
33. Avoiding Third-Party Access Pitfalls That Cause Security Risks.
34. Why Your Enterprise Must Pay Close Attention to IoT Device Security.
35. The hosted suite spot.
36. Fighting spyware is never-ending battle.
37. Double-edged security.
38. Identity 2.0 fine-tunes access.
39. DRM Lockdown.
40. IIS ADD-ONS TOUGHEN DEFENSES.
41. IBM targets access control with security.
42. Security Pros Want Automated Security, but Hesitate to Deploy It.
43. Google Joins Yahoo, AOL in Adopting Stricter Email Authentication.
44. FIDO Alliance Finalizes Strong Authentication Security Specs.
45. Implementing an Intelligence-Driven Security Strategy: 10 Data Points.
46. Aorato Uncovers Critical Microsoft Active Directory Vulnerability.
47. Point.io Launches APIflow for Data Access, Collaboration.
48. Microsoft Turns On Office 365 Multifactor Authentication.
49. Microsoft: World Governments' Turn to Tackle Data Privacy.
50. Centrify Launches Certification Program for Partners.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.