Ransomware attack trends will split based on motives Ransomware as a disruptive or destructive attack will increase. Cyber warcraft is…
Browsing: Identity and access management (IAM)
Ransomware / Malware Backups will not prove enough to stop ransomware as hackers find ways to subvert this strategy. – George…
The former CIA director Michael Morell has admitted that the leaker involved in the NSA Shadow Brokers leak might still…
Following the news that security flaw has been detected in office collaboration tool Huddle which has led to private documents…
News broke yesterday that a cybersecurity company based in Singapore has already ‘beaten’ the latest facial recognition feature unveiled by…
Yesterday, Big Brother Watch (BBW) published the ‘Police Access to Digital Evidence’ report which revealed 93% of UK police forces…
When it comes to expectations around the necessity for securing and protecting customer data, the EU General Data Protection Regulation…
News broke overnight of a new banking trojan, discovered by security experts and christened IcedID. The trojan appears to still be…
Picking a name for anything can be hard, but we take a lot of time because it’s important. A name…
New human-centric security features bring together cloud access, data protection and network security capabilities to identify, adapt and respond to…