As somebody who works closely with cryptocurrencies, it’s very common for me to receive phishing emails. Of course, we have…
Browsing: Identity and Access Management (IAM)
Consumer trust in a business has never been so critical. Take, for example, the recent hack on Ashley Madison which…
Federating Access through SAML or OpenID Connect is Not Enough—Go the Last Mile with a Federated Identity (Data) Service With…
A fierce storm blows through your town in the wee hours of the morning. Upon waking up a few hours later, you…
Following the revelation that users of pornographic app ‘Adult Player’ are being subjected to ransomware attacks, security experts Raj Samani…
Almost every website and app relies on a username and password combination to authenticate users. And that system, which the…
Encryption is a Red Herring – Segmentation is the key to Effective Security A new month, a new data breach.…
Mobile apps increase enterprise attack surface and put sensitive corporate data at risk, according to analytics from Veracode’s cloud-based security…
Security professionals profile who is most likely to lose sensitive data to help inform security strategies Mid-career professionals were also…
New Lieberman Software study reveals organisations are relying on traditional IT security solutions to protect against modern day cyber attacks…