The Internet of Things (IoT) has been weaving itself into the fabric of everyday life for some time now, including everything from connected cars to smart home applications
Browsing: Identity and access management (IAM)
Mobile shopping adds even more convenience to online shopping as it can be done while on the go. However there are a number of security concerns which are often overlooked by consumers.
As if 2013 was not exciting enough in the world of cyber security, 2014 will continue to keep us on our toes.
Although federation divides the work between an identity provider (IdP) and a service provider/relying party (SP/RP)
CyberSponse, Inc has joined the ICS-ISAC as a supporting member and is providing its secure intelligence threat defense management platform
This whitepaper examines the implications of the new PCI DSS Version 3.0 for businesses and looks at how the requirements can help to minimise the threat of card data theft
According to a post on the Russian cybercrime forum, i2Ninja offers a similar set of capabilities to the ones offered by other major financial malware:
Cloud and BYOD are all converging on security professionals like ants to a picnic. So many of the traditional tools and methodologies the security industry
Amit Klein, CTO at Trusteer, an IBM company, has compiled what Trusteer sees to be the most dangerous malware trends for 2014. See his comments and an infographic below
SSL expiration has been making headlines lately with Netcraft recently reporting over 200 certificates have expired in relation to the US government shutdown.