Sources: – https://meltdownattack.com/ – https://www.wired.com/story/critical-intel-flaw-breaks-basic-security-for-most-computers/?mbid=email_onsiteshare Two vulnerabilities: – Meltdown o Description: Normally Intel x86 processors enforce memory separation between the Operating System (OS) kernel…
Browsing: Identity and access management (IAM)
If column inches on an issue equated to how seriously organisations took it, then cyber security would undoubtedly be the…
In a recent survey, it has been found that 61% of consumers surveyed claimed that they are more worried about cybersecurity…
How does this chip flaw impact on Linux? The flaw is OS independent, so the impact is far more reaching…
More DDoS attacks could be on the way after hackers made public the code behind the Satori botnet. The Satori…
Following the news that a fundamental design flaw in Intel’s processor chips, dating back to 1995 would allow an attacker to read…
This past October felt as if someone had called open season on IoT devices. One of the biggest headlines surrounded…
Orchestration and Automation In 2018, cybersecurity orchestration and automation will increase in both relevance and adoption. This will be driven…
Everything is connected, every surface area is primed for data-capturing IoT, and life is mostly conducted from our phones. Even…
In response to the news that California voter database compromise affecting 19 million voters, resulting in a ransomware attack, Carl Wright, Chief Revenue…