As the number of digital transactions dramatically increases, so does the risk and likelihood of cyber-attack. This means that organisations…
Browsing: Identity and Access Management (IAM)
Social engineering attacks are usually associated with deceptive phishing emails in which the victim is tempted to click on a…
In response to the news that the police are warning that the EU GDPR has prompted a wave of scam messages…
Endpoint security is failing. There are a million attackers out there devoting all their energies to getting through the network…
Trust is a huge issue in most sectors. Borne from years of ruthless competition, battles for customers and getting ‘one…
Daniel Mintz, Chief Data Evangelist at Looker: “After the best part of two years of preparation, debate and conjecture, today, the…
Sarka Pekarova, Cybersecurity Consultant at SureCloud looks at how social engineering can help improve data security Organizations worldwide invest billions…
Like any good Information Security professional, I enjoy scaring the daylights out of my friends and family about protecting their…
News broke this week that the TeenSafe app allowing parents access to their children’s web browser history, text messages (including deleted…
Congress last night passed anti-fraud measures in the Economic Growth, Regulatory Relief and Consumer Protection Act to help prevent synthetic…