Recently, Corero Network Security identified a change in the way attackers are using DDoS as a mechanism to target their victims’ networks.
Browsing: Identity and Access Management (IAM)
AlienVault Labs has been tracking a cyber espionage group from Russia for years. Here’s what we know about it.
According to a survey carried out jointly by B2B International and Kaspersky Lab, 13 percent of Internet users do not believe that cyber threats are real.
NeoMam Studios reveals that many IT pros are either unaware of the threats to cloud security or are not taking sufficient action to minimise them.
Local fingerprint biometrics such as Touch ID Fingerprint stands to increase security and convenience. But could it replace the password?
There are many reasons businesses need to protect themselves from a possible data breach via third-party data recovery providers.
Incapsula has released a new playbook that teaches you how to prepare for a DDoS attack, what to do if one hits, and how to ultimately respond to it.
A cyber security expert has told a House of Lords committee that a basic understanding of cyber security among all company employees is critical.
A European study by information storage and management company Iron Mountain has discovered an unexpected downside to advanced data back-up and storage capability.
A new survey reveals 78 percent of IT security professionals are confident that firewalls and anti-malware tools are robust enough to combat today’s APTs.