The BBC today ran a story covering how cyber-attackers are now turning to tools that automate the process of finding and hijacking…
Browsing: Identity and access management (IAM)
The report issued today by the House of Lords Committee, warns that the UK has what it takes to become…
New report provides statistics on web application vulnerabilities, based on client security audits performed with PT Application Inspector in 2017…
Bomgar has announced the findings of its 2018 Privileged Access Threat Report, a global survey that explores the visibility, control, and…
While application breaches jumped 55%, emerging DevSecOps practices grew 15% Sonatype, the leader in open source governance and DevSecOps automation,…
Russian hackers are targeting millions of devices around the world to spy, steal information and build networks for potentially devastating…
The ability to predict—and defend against—malicious activity is something of a holy grail in the realm of security. There are…
Cloud Security Alliance Global Enterprise Advisory Board Publishes State of Cloud Security 2018 The report, authored by the CSA Global Enterprise…
While new security regulation for financial businesses in New York recognises that employees may be the weakest link, there should…
Hackers could steal credentials through a Microsoft Outlook vulnerability (CVE-2018-0950) just by having victims preview an email in Microsoft Outlook.…