Since the early days of computing, passwords have long been used as a method of identity authentication. However, there is…
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
For years, cybersecurity was considered a “check-the-box” discussion during the merger and acquisition (M&A) process. It was almost always examined…
With the GDPR deadline now passed, the sigh of relief from IT departments up and down the country was almost…
Cybercriminals looking to make a profit are turning their attention towards an industry known for housing sensitive consumer data with…
The General Data Protection Regulation (GDPR) is finally in force, and the entire cyber security community has had to familiarise…
There are countless ways to carry out a cyber attack, but for the vast majority the key is deception –…
In today’s fast paced, digital age, companies are under increasing pressure to deliver when it comes to customer service. McKinsey…
What constitutes a weak link? And what can be done to mitigate growing threats via IoT? IoT technology everywhere. No, this…
Business have been rushing to take advantage of the Internet of Things (IoT) for some years now. The early IoT…
The City of London Police announced that they will be hiring a team of cyber detectives, amid growing concerns of…