The Internet of Things is, just below the surface, an ever increasing web of interconnected APIs.
Browsing: Identity and access management (IAM)
Cryptzone, have confirmed that MOEITS is the first customer to upgrade to the latest version of its Secured eCollaboration
Tripwire have announced the results of an extensive analysis of security vulnerabilities in Small Office/Home Office (SOHO) wireless routers.
IoT – The risks facing consumers are tremendous due to the access that each of these Internet-connected devices may potentially provide to an attacker.
This is a highly elaborate ploy that originates on Facebook, where cyber-criminals advertise a series of apps
The hackathon is built on a public cloud without any special protection except those provided by the Software Defined Perimeter.
Much greater collaboration between governments, industry and academics will be needed to counter the next generation of cyber security threats
BBC News reported today that power companies are being refused insurance cover for cyber-attacks because their defences are perceived as weak.
Unlike traditional mobile security apps, which utilize a database of known malicious apps to screen for viruses and malware, viaProtect monitors all app.
The CSA is investing heavily on the SDP concept hoping it will solve some of the security challenges presented by cyber criminals, threats, and governments.