Google security researcher Michele Spagnuolo has developed a proof-of-concept tool called Rosetta Flash that reveals security problems with Adobe Flash.
Browsing: Identity and access management (IAM)
The Internet of Things represents myriad new and exciting opportunities, but the IoT relies on networks, and those networks need to be protected.
The latest in a string of lawsuits between businesses and their banks over alleged cyber heists is between Tennessee Electric Company and TriSummit Bank.
NeNames’ Internet 2020 Report reveals that 40% of survey respondents believe the introduction of new domain names will make the web more dangerous.
Security expert Mark Stanislav discusses the delicate balance of focus and tact that companies need to build a positive security culture.
Safelight Security offers a look at a few techniques most commonly used among attackers to steal people’s passwords.
Intercede has found that consumers are leaving back doors open to hackers when they sign up for automatic login on mobile apps or when they share PIN codes.
Given the prevalence of mobile devices in the workplace, businesses should institute a BYOD policy that does not expose them to additional risks.
John Walker comments on common user behavior with respect to mobile devices and suggests that these tools deserve more respect and security awareness.
According to a new study by Iron Mountain, 46 per cent of IT teams will insist on keeping data close at hand on hardware they can see, touch and control.