Professor Avishai Wool, CTO and co-founder at AlgoSec, looks at how organizations can ensure network security is extended to AWS…
Browsing: Identity and Access Management (IAM)
Governance of company data has never been trickier for organisations than in today’s business world. It was not so long…
When was the last time you assessed your cybersecurity strategy? Given today’s ever-changing security landscape, it’s probably been too long.…
In response to news that Google parent company Alphabet’s Jigsaw Project is offering to protect US mid-term campaigns from online…
What is Brand Forgery? In the past, the “Nigerian prince” scheme was effective, where an attacker claimed to be a…
The US Department of Energy has released its Multi-Year Plan for Energy Sector Cybersecurity to help make US energy systems more resilient and secure. The…
A newly discovered data breach has left over 3 million Facebook users’ data exposed for four years on an unsecured…
Cryptocurrency seems to bring out the best effort from cyber criminals. From nation states to traditional attackers, the rise in…
Following the news that a serious flaw was found in secure email tech, PGP, IT security experts commented below. Laurie Mercer, Solutions…
The five-day event hosted by non-profit, open-source organisation seeks to plug application security knowledge gap in an ever-evolving cybersecurity sector…