Luke Potter, head of cyber-security practice at SureCloud, explains how standard penetration testing models leave customers in the dark, and…
Browsing: Identity and access management (IAM)
~ However, the majority of IT security decision makers are confident in their own organisation’s cybersecurity recovery strategy ~ Large…
88 percent of IT professionals acknowledge the importance of endpoint management, yet 30 percent don’t know how many they have …
Following the news that ancestry site MyHeritage has been breached, potentially exposing the data, and in some cases the DNA details, of…
It didn’t stop with Cambridge Analytica. Over the weekend, the New York Times exposed the fact that Facebook gave device makers deep…
New report shows that cybercriminals are concentrating their efforts on banks, government, and healthcare In a new report, Web Application Attacks…
Hyper connectivity, regulatory pressures, and heightened customer expectations are all having a significant impact on how companies operate. From financial…
In light of the news that surfaced overnight regarding the European Commission leaking personal data on its website, which, for other organisations,…
With every day that goes by more IoT (Internet of Things) devices are becoming a part of our normal everyday…
Six weeks since the TSB crisis and new research from business continuity and disaster recovery provider, Databarracks,has revealed that 85 per…