In light of Critical Infrastructure Security and Resilience Month and with the threat of a cyber attack against Critical National Infrastructures (CNI)…
Browsing: Identity and access management (IAM)
Unfortunately, many organisations see Software Asset Management (SAM) as a compliance reporting tool and little else. This is in some…
The number of High Court cases involving employees stealing confidential data has increased by 25 per cent in a year, according to new figures.…
Check Point adds new capabilities to SandBlast Mobile Solution in response to increased mobile cyber threats: survey of over 850 firms globally…
It has been reported that fashion retailer, Forever 21, has announced that there had been unauthorised access to data from payment cards…
Cisco Systems has discovered a critical vulnerability is its Cisco Voice Operating System software that allows an unauthenticated, remote hacker…
Introduction The Internet of Things (IoT) is impacting the lives of millions around the world – but none more so…
Research & analysis conducted independently by Dr. Matthew Green, Dr. Stefano Tessaro, and Dr. Yevgenly Dodis Secure Channels Inc., provider of…
News has just surfaced that Cash Converters has been hit by a data breach. The company reported that it had: “Received an email threat…
The current cyber-threat landscape is increasingly complex, with cyber-attacks becoming far more widespread, sophisticated and more straightforward to execute. In…