It has been reported that four National Health Service trusts in England and Wales spent no money on specialist cyber-security training or expertise…
Browsing: Identity and access management (IAM)
Jumio’s Holiday ID Fraud Report indicates that ID fraud attempts worldwide more than doubled since 2014 New data from Jumio, the…
Risk and vulnerability assessments introduced to assist the development of effective security strategies One of the UK’s fastest growing and…
Following the news around hackers stealing more than $800,000 from Cape Cod Community College last week through an email phishing scam Matt…
Following the news that Australia passed a hotly-debated national encryption law, IT security experts commented below. Colin Bastable, CEO at Lucy Security: “The…
The media headlines were about the end of austerity and the digital sales tax on Google and Amazon. Yet from…
It has been reported that a severe vulnerability in Kubernetes, the popular, open-source software for managing Linux applications deployed within containers, could allow an…
A hacker group has compiled a list of 35,000 chief financial officers, some working at the world’s biggest banks and…
Quora.com, a site where people ask and answer questions on a range of topics, said hackers breached its computer network…
On Friday it was reported that Sotheby’s Home has become the latest casualty of Magecart. The auction house became aware…