In a new blog post researchers from Proofpoint have tracked a phishing campaign leveraging the concept of “Twitter Brand Verification”. Because…
Browsing: Identity and access management (IAM)
Insider threats and the danger they pose are both extremely publicized and well covered topics. Apart from the famous NSA…
Today’s threat landscape is constantly evolving. In 2016 in particular, we’ve seen a huge shift with adversaries penetrating organisations from…
Zero-Day in Intel Security Solidcore could allow attackers to successfully penetrate banks with customized malware London (UK). Intel Security has…
GDPR. Four letters, one colossal shift in privacy compliance for companies around the globe. With organisations collecting increasing amounts of…
Data Will Continue to Be Weaponized in New and Inventive Ways Between the ransomware attacks that plagued the healthcare industry…
A number of Groupon users have seen hundreds of pounds stolen, as hackers snap up expensive goods using their accounts.…
Businesses and consumers alike have been affected by the almost daily threats of data breaches and the impact of these…
What’s true in life is true in business: the best kind of mistake to learn from is someone else’s. And…
Bryan Lillie, Chief Technology Officer at QinetiQ explores the current threat of IoT-based cyber-attacks and suggests a novel method that could defend against…