What can you learn from reading the exploits of the most successful hacking ring ever brought to justice? Recently, the US Attorney’s Office in NJ unsealed their indictment against a mostly Russian
Browsing: Identity and Access Management (IAM)
Leading UK Fraud prevention consultancy and analyst UKFraud is calling on the insurance industry to accelerate activity in its management of fraud and fraudsters.
A Chinese hacking group accused this February of being tied to the Chinese army was caught last December infiltrating a decoy water control system for a U.S. municipality, a researcher revealed on Wednesday.
In the wake of the press stories about government surveillance, many, including me, have pointed to tools such as Tor to protect anonymity.
In my last post I discussed Edward Snowden and his exposure of the mass electronic surveillance by the US government of its citizens via its PRISM program.
The relaxing atmosphere of surfing at the beach makes it easy to forget about the sharks. Connecting to an unsecured network poses serious risks to your laptop and data.
Google Glass, for all its promise, has some scary implications. Here is my list of 5 potential challenges we face with Glass:
In 1995, Nick Leeson aptly demonstrated the damage a single rogue employee can bestow on an unsuspecting organisation.
The UK government is to invest more than £850m to develop and maintain what it calls “cutting-edge” capabilities to tackle cyber threats.
Morphing existing IT security policies to accommodate for bring your own device (BYOD) is the wrong way to address BYOD, according to IBM Institute for Advanced Security director, Glen Gooding.