Cybercriminals to Target New Payment Technologies, Generic Top Level Domains and the US Elections in 2016 The year 2015 has…
Browsing: Identity and Access Management (IAM)
A recurring claim at security conferences is that “security is a big data / machine learning (ML) / artificial intelligence…
Did you know that one in every two top managers pay money into corporate accounts via a mobile banking app?…
2016 will be characterized by power shifts as corporate IT, and the technology it employs, transforms at an exponential rate.…
Organisations invest a lot of time, resources and money into ensuring the security of their back office systems but this can often…
Netwrix 2015 Cloud Security Survey reveals unauthorised access and account hijacking are the leading security risks associated with the cloud…
The information created and processed by a business, whether about products, operations, customers or financial performance, can play a vital…
Following the news of the Twitter cyber attacks, please find below advisory comment from David Emm, principal security researcher at…
Open source: Security through transparency The contrast between proprietary and open source software is as old as the IT industry…
You may have seen news that, following the recent emissions scandal, carmakers seeking approval of new vehicles in Germany will…