As the vision of smart cities increasingly becomes reality, so too does the issue of security surrounding them. What can…
Browsing: Identity and Access Management (IAM)
I wake to the sound of my smartphone, which has assessed the correct time for me to start my day by…
The healthcare company revealed that it cannot locate six hard-drive disks containing personal information on patients who have had lab…
Everyone knows somebody that has been hit by some type of digital scam. These days’ hackers have it down to…
A recent influx of attacks on loyalty cards and schemes targeting companies including Hilton, Costa Coffee, British Airways and Tesco…
Cloud computing platforms and services have come a long way in the last few years. In 2010, the Cloud Industry…
You may have seen that Amazon Web Services has launched its ‘Certificate Manager’ platform this week, allowing developers access to…
A security researcher has said software developed by the UK intelligence agency GCHQ contains weaknesses making it possible to eavesdrop…
Following news that TalkTalk saw a significant drop in its market share following last year’s wide-scale cyberattack, Richard Parris, CEO…
The year hackers got your fingerprints, your health records, and your love life. 2015 will go down as another landmark…