Following the news that more than 1 million websites running the WordPress content management system may be vulnerable to hackers stemming…
Browsing: Identity and Access Management (IAM)
The digital age has given rise to a plethora of new possibilities for data storage and sharing. Businesses of all…
Following the news of the CloudPets Data Breach, Tod Beardsley, Director of Research at Rapid7 commented below. Tod Beardsley, Director of Research…
If a computer can outsmart us playing chess, what is the next move for mankind? If an automated botnet can…
Following the recent news that the technology industry has hit back at proposed plans by France and Germany to force…
Following the news about the recent HSBC outage, Guillaume Ayme, IT Operations Evangelist at Splunk commented below. Guillaume Ayme, IT…
Protection Group International host the first Cyber Security Challenge UK face-to-face competition of 2017 30 of the UK’s top amateur…
By now, you’ve seen some breakdown of SaaS vs. PaaS vs IaaS, with respect to security. You’ve also probably seen…
Security researchers have found a security lapse at Stewart International Airport that exposed server backups to the Internet for more…
Almost half of all phishing attacks (fraudulent email messages or copycat websites that appear legitimate) registered in 2016 by Kaspersky…