Access Control

Access Control | News, how-tos, features, reviews, and videos

29 tips for succeeding as an independent developer

Find out how to cut corporate ties and transform your coding chops into a thriving business that can go the distance

Liquid computing: The next wave of the mobile experience

The traditional enterprise workflow is ripe for huge change as the focus moves away from working in a single context on a single device to the workflow being portable and contextual

The care and feeding of a rockstar developer

Whether you're a hiring company, an educator, or a developer, find out what you're up against in the war for programming talent

The beginner's guide to Docker

Dig into Docker, the red-hot open source framework, from getting started to services you can use right now to the company's direction, in this downloadable PDF

Digital Spotlight: Cloud Security

The scalability of cloud computing depends on sharing resources that were never shared before, creating a new set of risks and demanding a new set of security best practices

Special report: The triumph of JavaScript

JavaScript is the reigning programming language across platforms and devices. Harness that power with the right frameworks and tools

Download the Hadoop Deep Dive

Businesses are using Hadoop across low-cost hardware clusters to find meaningful patterns in unstructured data. In this in-depth PDF, InfoWorld explains how Hadoop works and how you can reap its benefits

Download the HTML5 Strategy Deep Dive

Preparing your website and Web apps for HTML5? Here's what you need to know

Download the Cloud Security Deep Dive

The scalability of cloud computing depends on sharing resources that were never shared before, creating a new set of risks -- and demanding a new set of security best practices

SDS still young, but very much on the rise

Offering increased protection and a simplified approach, software-defined security is shaping up to be the next big thing in IT security

IBM buys access control and identity management firm CrossIdeas

With CrossIdeas, IBM is gaining auditing tools for policing segregation-of-duties violations across disparate systems

The 12 biggest, baddest, boldest software backdoors of all time

These 12 historically insidious backdoors will have you wondering what's in your software -- and who can control it

How to benefit from the identity data explosion

Everyone wants to avoid being the next Target. Brian Milas, CTO at Courion, explains how to use the rich data generated by identity and access control solutions to reduce risk

Target attack shows danger of remotely accessible HVAC systems

Qualys says about 55,000 Internet-connected heating systems, including one at the Sochi Olympic arena, lack adequate security

Book smart, security stupid: Rogue professors flunk Security 101

Two academics betray highly ill-advised security practices when using the university's computer network

EMC's Syncplicity service tightens controls on shared files

Data now can be made unavailable even when it's stored offline, EMC says

Alcatel-Lucent challenges Cisco, Brocade unified access

Alcatel-Lucent offers enterprises free switch upgrade that converges wired Ethernet networks with wireless BYOD management from Aruba

Cisco patches vulnerabilities in some security appliances, switches, and routers

If left unpatched, the vulnerabilities could enable denial-of-service, command execution, or authentication bypass attacks

Cisco fixes critical remote command execution vulnerability in Secure Access Control Server

The vulnerability could allow remote, unauthenticated attackers to take control of the underlying operating system, the company said

Those 'invisible' servers could open your network to hackers

Slew of vulnerabilities in IPMI standard for disaster-recovery access leaves unpatched implementations at severe risk

Load More
You Might Also Like