Data breaches and cyber-attacks seem to have become the new normal in today’s increasingly digital world, but it’s not all gloom-and-doom – there are steps you can take to protect your organisation.
With the Internet of Things (IoT) fast becoming the default setting of our professional and personal lives, more attention needs to be paid to security. In this, the second of two parts, Digital News Asia (DNA) speaks to experts from a range of backgrounds.
Are companies aware of the need for security in the new IoT world? How are they balancing the need for security with that of ease of use? Is security just an afterthought? Benjamin Cher finds out.
CA Technologies said there were five key trends in security and identity and access management that will impact organisations and security professionals in 2015 as they compete in the application economy.
CA Technologies said its new release of CA Risk Analytics includes intelligent, self-learning authentication technologies that help reduce friction for consumers during online checkout, and also allow card issuers to reduce incidents of fraud, increase revenue, and gain new levels of flexibility and control in their fraud detection systems.
CA Technologies has announced the availability of CA Identity Suite, a new, one-stop identity management and governance solution that it said transforms data into business information and simplifies identity management and access governance across the enterprise.
CA Technologies has launched what it claimed was the industry’s first, comprehensive ‘Management Cloud for Mobility.’
CA Technologies is urging CIOs in Malaysia to embrace disruptive technologies such as cloud, mobile, social, and big data, and put IT in the driver’s seat to create business innovation.
Touting his company’s Content-Aware Identity and Access management (IAM) vision, Vic Mankotia, CA Technologies vice president for Security in Asia Pacific and Japan, says that security has to move from being seen as an investment or significant procurement to being a business enabler; from ‘no you can’t do that’ to knowing who is accessing what kind of info and where.