Risk and vulnerability assessments introduced to assist the development of effective security strategies One of the UK’s fastest growing and…
Browsing: Identity and Access Management (IAM)
Following the news around hackers stealing more than $800,000 from Cape Cod Community College last week through an email phishing scam Matt…
Following the news that Australia passed a hotly-debated national encryption law, IT security experts commented below. Colin Bastable, CEO at Lucy Security: “The…
The media headlines were about the end of austerity and the digital sales tax on Google and Amazon. Yet from…
It has been reported that a severe vulnerability in Kubernetes, the popular, open-source software for managing Linux applications deployed within containers, could allow an…
A hacker group has compiled a list of 35,000 chief financial officers, some working at the world’s biggest banks and…
Quora.com, a site where people ask and answer questions on a range of topics, said hackers breached its computer network…
On Friday it was reported that Sotheby’s Home has become the latest casualty of Magecart. The auction house became aware…
Adam Laub, Senior Vice President at STEALTHbits Technologies, points out the lessons to be learned from the recent Dunkin’ Donuts data…
Whether you like it or not, such a mishap may come true someday. I can imagine your anger and despair…