Cyber eason has today published results of its second annual ransomware study during a year of unprecedented attacks to better understand the…
Browsing: Identity and Access Management (IAM)
Researchers at IBM’s X-Force team are reporting a 94% reduction in the duration of an enterprise ransomware attack from 2019…
In Part 1 published by Information Security Buzz 25th May 2022, the article considered aspects of historic threats posed by…
The benefits of using technology to manage third-party risk are not lost on compliance professionals. When you consider the growing…
Organizations are rapidly turning to APIs because they bridge the gap between independent applications and programs and, in turn, facilitate…
Looking at what the big players are doing, it’s easy to view the Metaverse as a big thing. Facebook has…
The UK Treasury is becoming increasingly frustrated by the billions of pounds wasted by government departments on legacy technology and…
When companies think of security, they often only think of passwords, encryption, and hacking. With the transition to flexible, hybrid,…
Ransomware in the healthcare sector For years, the focus of cybersecurity efforts in the healthcare sector has been on protecting…
As the Cash app breach story unfolds, it is clear why Zero Trust & Least Privilege Access matter. In the…