Foresight Advisory Services’ Heine van Niekerk takes a look at the growing cybercrime threat in South Africa.
Browsing: Identity and access management (IAM)
Bloxx, a leader in Web content filtering and security, today announced the release of the latest version of its Web Filter and Secure Web Gateway products.
Dug Song and Jon Oberheide are the kind of passionate and ambitious entrepreneurs Benchmark is proud to back and work alongside
A number of information security experts comment on the Bash “Shellshock” vulnerability.
Security remains a prevalent concern for consumers when it comes to online banking, whether they use the platform or not. But so does convenience.
A report released by Iron Mountain suggests that marketing professionals are far more likely to engage in behavior that endangers customers’ data security.
Users’ access rights, specifically instances of insider misuse, have become a weak point in security policies for a majority of organisations.
Yonni Shelmerdine of Lacoon identifies a number of critical takeaways with respect to the iCloud hack.
Magnetic tape was first used to store computer data in 1951. By the mid 1970s pretty much everyone relied on tape cassettes and cartridges.
UX is often mentioned in the context of a User Interface (UI), but only recently has UX become a topic of conversation in security circles.