Thorsten Trapp, Co-Founder and CTO at Tyntec, predicts that the adoption of SMS-based 2FA will see a significant surge in 2015.
Browsing: Identity and Access Management (IAM)
An infographic instructs users about encryption and illustrates how they can protect their priceless personal information.
Ilia Kolochenko, CEO of High-Tech Bridge, makes some cyber security predictions.
Jonathan Sander of STEALTHbits Technologies uses the Sony hack to illustrate how hard it is to communicate security-related information.
DDoS attacks are commonly utilised as a distraction for a much larger and more damaging attempt at data exfiltration or breach.
ESET Ireland researchers have compiled a summary of the most important cybercrime trends we can expect in 2015.
Ponemon’s latest research quantifies a point that we’ve all come to understand: the cost of data breaches is increasing for organizations of all sizes.
The Internet Systems Consortium, better known as ISC, thinks it might have had a malware infection.
Carmine Clementelli, Security Expert and Manager at PFU, a Fujitsu Company, investigates the Sony hack and wonders if it was an inside job.
As we approach the new year, here are eight areas of IT security for you to consider to avoid becoming the next data breach news story.