Digital inclusion is the ability of individuals to access and use information and communication technologies (ICT). Even in today’s hyper-connected…
Browsing: Identity and access management (IAM)
A new Ransomware-as-a-Service called Yatron is being promoted on Twitter that plans on using the EternalBlue and DoublePulsar exploits to spread to other computers on a…
The debate on the subject of self-half images hosted on Instagram seems to have got lost in translation by the…
The Dutch Data Protection Authority says that cookie walls that force consumers to accept tracking cookies is not compliant with…
Dozens of companies inadvertently leaking sensitive corporate and customer data because of misconfiguration of their Box enterprise storage accounts. The…
Karl Barton, Senior Director, International Channels and Alliances at SecureAuth commented below, in regards to how cybersecurity has changed along with the…
The State of AI 2019 is comprehensive study which shows that corporate adoption of Artificial Intelligence has tripled in the last 12…
Following last week’s news that Google is now rolling out several new cloud security services, Chris Morales, head of security analytics at…
Check Point’s researchers confirm Coinhive holds the top position in February’s Top Malware index for 15th successive month before it shut down,…
The Verizon Data Breach Investigations Report (DBIR) series opened the doors to the world of cybercrime – now, this dataset…