New report provides statistics on web application vulnerabilities, based on client security audits performed with PT Application Inspector in 2017…
Browsing: Identity and Access Management (IAM)
Bomgar has announced the findings of its 2018 Privileged Access Threat Report, a global survey that explores the visibility, control, and…
While application breaches jumped 55%, emerging DevSecOps practices grew 15% Sonatype, the leader in open source governance and DevSecOps automation,…
Russian hackers are targeting millions of devices around the world to spy, steal information and build networks for potentially devastating…
The ability to predict—and defend against—malicious activity is something of a holy grail in the realm of security. There are…
Cloud Security Alliance Global Enterprise Advisory Board Publishes State of Cloud Security 2018 The report, authored by the CSA Global Enterprise…
While new security regulation for financial businesses in New York recognises that employees may be the weakest link, there should…
Hackers could steal credentials through a Microsoft Outlook vulnerability (CVE-2018-0950) just by having victims preview an email in Microsoft Outlook.…
Following recent news that Google Chrome and Mozilla Firefox will ship with password-less WebAuthn enabled as their default identity authentication,…
Cyber criminals are leveraging the Universal Plug and Play (UPnP) protocol found in all routers for various criminal activities. The…