PIN verification will soon become a thing of the past. Thanks to advances in fingerprint biometric technology, the reality of…
Browsing: Identity and access management (IAM)
Password managers, long heralded as the gold standard for consumer password safety, have been shown to have vulnerabilities. Research shows…
It has been reported that pregnancy club Bounty UK has been given a £400,000 fine by the ICO for illegally…
It has been reported that the U.S. Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have issued a…
Symantec issued a report yesterday that two thirds of hotels inadvertently leak guests’ booking details and personal data to third-party sites, including advertisers and…
Our spending behaviour in the UK is certainly far different from what it once was. After all, how often do you now…
Reaching out to share 2018 breach trends research from F5 Networks which explores the relationship between business models and breach vectors. This…
Like most of the cybersecurity industry, the Awake team was on the ground at RSA Conference last month discussing the…
Kaspersky Lab researchers have uncovered a technically sophisticated cyberespionage framework that has been active since at least 2013 and appears…
Enterprises are increasingly recognising the benefits of embracing a cloud infrastructure to support on-premise networks, but often create complicated network environments in…