How Can IAM Help To Secure The Hybrid Workforce?

Secure Passwords for the cloud

As we find ourselves under lockdown for a third time, a return to the office looks unlikely for the foreseeable future. Even when businesses do begin to reopen their doors, a sizeable part of the population will continue working flexibly. Businesses must ensure their workers can access resources and collaborate with colleagues securely at all […]

Old Security Vulnerability Left Millions Of Internet Of Things Devices Vulnerable To Attacks

It has been reported that vulnerabilities in the communications protocols used by millions of Internet of Things (IoT) and operational technology (OT) devices could allow cyber attackers to intercept and manipulate data. The vulnerabilities in some TCP/IP stacks have been detailed by cybersecurity researchers at Forescout, who’ve dubbed the set of nine new vulnerabilities as ‘Number:Jack’.

Experts Reaction On 2021 Credential Stuffing Report Highlighting Poor Security Practices

According to F5’s new 2021 Credential Stuffing Report, although breach volumes have declined, poor security practices continue the downstream risk of credential exposure. The report “makes it clear that credential stuffing will remain an enormous risk to organizations of all types.” The F5 team collected the data to focus on three aspects of the ecosystem surrounding […]

Experts Reacted On Myanmar Military Government’s Cyber Internet Censorship Bill

A group of civil society organizations said on Wednesday that new Cyber-security laws proposed by Myanmar’s new junta to ban the content. The 36 pages proposed laws were given to internet service providers to provides comments in a week’s time. Cybersecurity experts commented below on the danger of Internet censorship.

Cybersecurity Expert Insight On Romance Scams This Valentine’s Day

Data Love

Romance scams are one of the UK’s top 5 most successful types of fraud, according to research from Feedzai, the financial crime solution specialist. With Valentine’s Day coming up this weekend, Cybersecurity experts provide an insight on what’s the best strategy to overcome such scams.