New hybrid work models are causing significant shifts both in where employees work and in how organisations procure technology. In…
Browsing: Identity and Access Management (IAM)
It is now inevitable that the encryption algorithms used to secure vital data across the world – from defence and…
BACKGROUND: It has been reported that some of the world’s most powerful, wealthy and famous people are thought to have…
Today 1st November, monetising YouTube channels will be required to set up 2-Step verification– if this has not already been set…
BACKGROUND: Researchers at the Lookout Threat Lab provide a highly detailed review of new rooting malware distributed in fully functioning…
BACKGROUND: It has been reported that Papua New Guinea’s finance department has been hit with a ransomware attack, locking access to…
Cybersecurity experts at Proofpoint are warning the public of a wave of email attacks related to Netflix’s hit show ‘Squid…
The cybersecurity landscape continues to evolve rapidly, due, in large part, to the way our lives have changed during the…
Over the past two years there has been a dramatic shift in the way organisations operate. With the coronavirus pandemic…
BACKGROUND: Yesterday, Britain’s National Cyber Security Council announced websites should allow customers to cut and paste passwords to access their accounts following new password…