International finance has become hugely complex. The increased velocity of trading, the development of highly sophisticated instruments and the growth…
Browsing: Identity and access management (IAM)
Following the news about the Lloyds Banking Group has launched selfie technology to enable Bank of Scotland customers to open a…
The emergence of new technologies in the last decade has irreversibly changed the way we live, work, and communicate; whether…
Following the news that a smash and grab malware gang has updated its FastPoS point of sales hack app to plunder…
No matter where you may be in the world, the email attachment is the most common means by which criminals…
Not long ago, the Department of Homeland Security directed extra attention to voter registration hacking threats. The recent news that the Arizona voter…
Information security is viewed in some organizations as a function owned by a few individuals or one department. However, it…
Targeted attackers are using an increasingly wide range of deception techniques to muddy the waters of attribution, planting ‘False Flag’…
Over the past few years many organizations have opted for virtual IT environments. A 2016 survey by Spiceworks reports that…
There’s a newly discovered flaw in macOS (and OS X) that could let miscreants peep on you through your webcam.…