Following the revelation that users of pornographic app ‘Adult Player’ are being subjected to ransomware attacks, security experts Raj Samani…
Browsing: Identity and access management (IAM)
Almost every website and app relies on a username and password combination to authenticate users. And that system, which the…
Encryption is a Red Herring – Segmentation is the key to Effective Security A new month, a new data breach.…
Mobile apps increase enterprise attack surface and put sensitive corporate data at risk, according to analytics from Veracode’s cloud-based security…
Security professionals profile who is most likely to lose sensitive data to help inform security strategies Mid-career professionals were also…
New Lieberman Software study reveals organisations are relying on traditional IT security solutions to protect against modern day cyber attacks…
The decision to move to SIP trunking appears straightforward: reduced costs, greater scalability, improved disaster recovery options and access to…
CryptoFlow Solutions Protect Any Enterprise Application for Any User on Any Device over Any Network Certes Networks, a leading innovator…
Netwrix lists the most common compliance questions asked by auditors Many organisations still fail to provide answers to fairly simple…
News Highlights: Retailers can improve service and enhance security by enabling floor staff to access the information they need by…