A database reportedly containing roughly 93.4 million Mexican voter registration records was discovered on an Amazon cloud server without any…
Browsing: Identity and Access Management (IAM)
For those already familiar with the function of a proxy server, there’s a good chance that the mere mention of…
EY launched its 2016 Global Fraud Study and the findings reveal that boards could do significantly more to protect their companies from…
Check Point threat research for March 2016 shows mobile malware attacks moving up the index of most prevalent families attacking…
EMV (Europay, MasterCard and Visa) credit and debit cards have finally seen widespread adoption in the USA, at least on…
Protecting a business from natural disasters and unwanted trespassers will probably come as second nature. But in the age of…
In an attempt to explore security issues in smart city transport infrastructure and give recommendations on how to address them,…
Only a week after hitting the headlines, the ‘Panama Papers’ scandal has already been established as the biggest data leak…
2016 hasn’t begun in a very positive way for education institutions. January 2016 saw data on 80,000 students, faculty, and staff…
E-commerce revenue is constantly increasing, but the number of fraud cases, as well as the percentage of fraud in online…