Gone are the days when companies only had to worry about valuable documents leaving the building in a pocket or…
Browsing: Identity and Access Management (IAM)
I clearly remember the first time I saw a computer. Someone was playing a video game called Demo Rush 3…
Following the news that Silicon Valley companies are planning to make further use of encryption, please find comment below from…
European IT decision makers cite budget, time and compliance as the biggest barriers to adopting new security technology, but over…
A hacker gang dubbed Anunak pulled off a high-profile attack against Energobank based in Kazan, the capital of the Republic…
Phishing is an increasingly devious, almost artistic, threat. The ultimate goal is to trick a target into either downloading malware…
Ofcom has experienced the largest data breach it’s ever faced after an employee offered private data on TV companies to…
Garter’s Magic Quadrant (MQ) 2015 for Web Application Firewalls (WAF) estimates that the global WAF market size is as big as $420…
Robert Hannigan, head of UK’s GCHQ, is reported to be seeking practical cooperation from the technology industry on how to balance the…
It doesn’t matter what industry you are in: passwords are going to be a major player in daily lives no…