Ilia Kolochenko, CEO of High-Tech Bridge on the recent story about Citrix’s CMS being hacked into, which he believes should…
Browsing: Identity and Access Management (IAM)
This weekend, The San Francisco Chronicle reported on PayPal and other companies buying stolen data from criminals, detailing the process…
Database security spending lags behind database hacks Sponsored by DB Networks, Assuring database security through protocol inspection, machine learning, and…
As of September 2015, there were 1.55 billion monthly active Facebook users worldwide. That is a bunch of people for…
Following the Information Commissioner’s Office (ICO) declaration that tougher sentences are needed to deter data thieves, Esther George, who is Director…
From Mission: Impossible to James Bond to today’s new spy thrillers, nifty gadgets have defined the genre, as our secret…
Cloud-based security solution minimises an organisation’s attack surface by governing and securing federated access by outsourced IT, vendors and other…
You’ve heard about penetration testing, but you’re not sure what to ask or where to start. Here are some of…
The attack permits the malware to jump onto computers in a unique manner, using the ‘Range’ HTTPS header. The Ursnif malware…
Over the past 12 months there have been several high-profile data breaches which have hit the headlines. Recently, almost 157,000…