Jacques Louw of MWR Infosecurity discusses the cyber threats associated with the idea of hacking a car.
Browsing: Identity and Access Management (IAM)
An infographic reveals how retailers and other entities track your movements via your smartphone and what you can do to protect your privacy.
Mark Kedgley of New Net Technologies urges us to stop pretending that current security policies can stop any breach from working its way into key systems.
Recently, techUK published a guide for cyber security companies with actionable advice to help identify and manage the risks of exporting their products.
Wallace Sann of Forescout Technologies weighs in on what federal agencies should be doing in order to avoid breaches such as the recent White House hack.
Kaspersky Lab’s Global Research and Analysis Team has published its research on Regin, one of the most sophisticated malware ever discovered.
The ongoing string of data breaches illustrates that enterprises must make a much more concerted effort to improve security.
IT professionals prefer open source to proprietary software, according to a survey by the Ponemon Institute and Zimbra.
Companies in the non-profit/charitable and education sectors rated virtualization security as their lowest IT security priority, according to a Kaspersky Lab
Kroll Ontrack, the leading provider of data recovery, has announced its 12th annual list of the top 10 data disasters from 2014.