Denis Gennadievich Kulkov, a Russian national, was indicted by the U.S. government today on charges of running a stolen credit…
Browsing: Identity and Access Management (IAM)
In reaction to a new rule requiring websites to verify that a visitor from the state is 18 or older,…
Businesses today are facing two acute challenges – the economy and cybercrime. This is forcing CISOs to make some tough…
Various government entities in the nation have been the target of cyberattacks by Russian nation-state hackers, all based on the…
It follows that vectors with greater internet exposure will also attract more attention from threat actors. Because of this, malicious…
Security professionals have issued alerts regarding a new type of malware that targets MacOS devices in an effort to steal…
According to an update released yesterday, Google is making it more difficult for unscrupulous developers to publish their software on…
What does a “good” cyber-security programme look like? How can we, in our role as Chief Information Security Officer (CISO),…
Businesses and organizations of all kinds are increasingly concerned about ransomware attacks, and recent information from Microsoft reveals that even…
Data has emerged as a company’s most essential asset in the modern world. Every security team prioritizes protecting sensitive data,…