On the dark web blog of the well-known Ransomware gang Hive. Data purportedly belonged to the renowned sports shop Intersport…
Browsing: Identity and Access Management (IAM)
Numerous government departments and the public believe to be bodies to have overcome hardship by a ransomware attack on Mercury…
Cyber-awareness Training And Spoofing Protection Mandatory Depending upon your line of work, there are numerous mandatory training courses which form…
The Wall Street Journal ran a great reminder on the dangers of what has been referred to as “sharenting”, posting every significant…
Predictions from technology experts Cybersecurity is already one of the biggest pain points for businesses. Indeed, cyber-criminal activity often outpaces…
It is no surprise that in our connected world most organizations are turning towards web-based applications and services to connect…
We’ve all become better at spotting phishing attacks, especially when they hit our inboxes. In fact, only 2.9% of employees…
Within the enterprise, the web browser is the gateway for almost every business activity, providing access and control over critical…
Threat actors are seeking to capitalize on or gain interest in their cause with assaults meant to draw unwitting people…
A suspected cyber assault has taken down the Vatican website. Just days before Pope Francis received criticism from Moscow for…