It has been reported that IBM has patched a critical vulnerability in Apache OpenWhisk, the open source serverless platform that IBM uses to run its…
Browsing: Identity and Access Management (IAM)
Sharing that today, F5 Networks released its 2018 Application Protection Report, which delves into the major application-based threats modern enterprises face…
News is breaking that popular wireless security camera designed to safeguard businesses and homes was vulnerable to a spying hack.The flaw meant…
Summary In an earlier article we briefly referred to Expanded Password System (EPS) that accepts both images and texts as…
It has been reported that the system that allowed spy agency GCHQ access to vast amounts of personal data from…
There is no such thing as ‘designing an artificial intelligence (AI) strategy’ because AI should be part of the business…
News broke over the weekend that 157 gigabytes worth of sensitive documents for over a hundred manufacturing companies were exposed on a…
News broke that hackers working for Russia claimed “hundreds of victims” last year in a giant and long-running campaign that put them…
Enterprise Mobility Management (EMM) is the process of leveraging people and technology to secure sensitive data present on employee devices.…
In light of the news that cyber thieves stole £11m of client money in a year, please find a comment from Adam…