Insider threats can pose a serious risk to security. Yet out of approximately 250 professionals surveyed by Varonis1, as many…
Browsing: Identity and access management (IAM)
How automation and orchestration optimise operations Programmability is critical in modern data centres and the cloud to support automation, orchestration,…
Action Fraud UK has warned that both businesses and universities need to be on guard against a new scam, which has…
The Ukrainian Secret Service (SBU) said today it stopped a cyber-attack with the VPNFilter malware on a chlorine distillation plant…
A new scam is doing the rounds, where fraudsters are emailing people their own passwords in a bid to convince…
The special counsel investigating Russian interference in the 2016 election issued an indictment of 12 Russian intelligence officers on Friday…
Timehop has revealed that more even more data had been stolen that originally thought in their breach. Timehop admitted that…
In Australia yesterday, as reported by abc.net.au, a third party supplier of airport security ID cards was hacked. The breach isn’t necessarily…
A recent survey, carried out by industry body EEF, revealed that almost half of UK manufacturers have been victims of a…
Francesco Giarletta, CEO of Avanite, examines the potential security issues that simple web browsing data can cause and how web…