15,435 vulnerabilities in close to 4,000 applications in 2014 15,435 vulnerabilities across 3,870 applications were recorded in 2014 – that’s…
Browsing: Identity and access management (IAM)
In today’s digital age, companies increasingly utilize various external platforms to store and access corporate data.
The recently announced breach of Premera, following so closely on the heels of Anthem, should set off alarm bells to…
VoIP may deliver great savings over traditional telephony, but with call-jacking over unsecured lines costing UK businesses – not the telephony…
Medical and healthcare data breaches on the rise – 27.5% increase, medical records fetch good coin on the black market.
The technology that enables our businesses evolves so often that it is seemingly obsolete just when you think you have…
Insider threats have cost US organizations almost $40 billion due to employee theft and fraud according to Verizon’s 2014 Data Breach…
DDoS attacks are now one of the most common and affordable cyberweapons. They are used by unscrupulous competitors, sinister extortionists…
We absolutely agree that employees are a big risk for organisations; for the simple reason that people are human and…
Enter the cloud, and exit your data. Since the introduction of BYOD and ‘the cloud’, your data has been on…