Companies have invested in protection technologies for decades – firewalls, web and email security gateways and endpoint protection. Over time,…
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
– Takeaways from Consumer Identity World USA 2018 – Introduction The so-called password-less authentication, if implemented literally, would lead us…
A year ago, the Equifax breach that exposed personal data of over 145 million people to cyber attackers shocked the…
Most small and medium sized businesses (SMBs) do not have enough defenses in place to protect, detect or react to…
The role of a Chief Information Security Officer (CISO) revolves around risk. Specifically, the CISO’s job is to identify, manage,…
The authentication method has been ignored in high-risk use cases. It could pave the way to a safer, easier Internet.…
Most organisations are aware that they could be the target of a DDoS attack and have deployed protection to keep…
Some common malware will attempt to gather information about its environment, such as public IP address, Language, and Location. System…
It is no surprise that hackers will always target high value, critical data, so amongst some of the most targeted…
Just a few weeks ago, Brussels airspace was closed for several hours following a technical problem. Labelled “a disaster” for…