It has been reported that Electronic Arts have come under fire for accidentally leaking the personal information of thousands of FIFA players, pros and streamers.…
Browsing: Identity and Access Management (IAM)
A series of sophisticated cyberattacks targeting Egyptian journalists, academics, lawyers, opposition politicians and human rights activists has been traced to…
Customer identity is a precious asset and a highly prized commodity. As the financial services industry has become more digitised…
It has been reported that a team of security researchers found they could tap into Webex and Zoom video meetings because many…
A former Yahoo engineer has confessed to breaking into as many as 6,000 email accounts belonging to Yahoo users. Once…
Many cybersecurity professionals mistakenly believe virtual desktop infrastructure (VDI) is an effective way to combat cybercriminals, or at minimum slow…
Arkose Labs · Over half of all logins (53%) on social media sites are fraudulent and 25% of all new…
Hagai Katz, head of Government Sector at Check Point explores how nation states can and should prevent cyberattacks against their…
In the earlier article “Secrity, Democracy And Digital Identity” , we made clear that we should look for ‘something other than the…
In the initial years of the public cloud, security was cited as the primary reason not to upload sensitive data…