Wolfgang Kandek, CTO of Qualys, Inc., comments on the Patch Tuesday for January of 2015.
Browsing: Identity and access management (IAM)
An infographic explains how the weak points of the internet can be exploited and details who keeps us safe online and how they do it.
Many SMBs are looking to managed security service providers (MSSPs) to help navigate the right approach to security solutions and practices.
The developers of codeREADr have announced the launch of auto-sync technology for offline ticket validation at events that will help tackle e-ticket fraud.
David Emm, Senior Security Researcher at Kaspersky Lab, discusses the recently disclosed Moonpig vulnerability.
Thorsten Trapp, Co-Founder and CTO at Tyntec, predicts that the adoption of SMS-based 2FA will see a significant surge in 2015.
An infographic instructs users about encryption and illustrates how they can protect their priceless personal information.
Ilia Kolochenko, CEO of High-Tech Bridge, makes some cyber security predictions.
Jonathan Sander of STEALTHbits Technologies uses the Sony hack to illustrate how hard it is to communicate security-related information.
DDoS attacks are commonly utilised as a distraction for a much larger and more damaging attempt at data exfiltration or breach.