The Center for Automotive Embedded Systems Security (CAESS) conducted a study showing what could happen if a determined hacker went after the computer systems embedded in cars.
Browsing: Identity and access management (IAM)
While UK and US unemployment figures are falling slightly, times are still difficult for many workers, and few are changing roles.
I’ve written before about the huge benefits you can reap if you plan for large sitewide outages by giving yourself access to all the troubleshooting tools you’ll need ahead of time.
Almost nine out of 10 senior staff members from Australian organisations have access to corporate data on their personal mobile phones.
Fraud has become an industry, with cybercriminals seeking profits through innovation, automation, commoditization and specialization. How do you respond to this criminal industry to ensure trust in IT?
The Syrian Electronic Army has breached the official blog of Channel 4, the popular British public-service television broadcaster.
GCHQ has always been the prime overseas partner for the NSA – and it has long been suspected that each partner within the Five Eyes relies on the others to circumvent its own domestic laws. This is denied, but…
The brain is a deviously complex biological computing device that even the fastest supercomputers in the world fail to emulate.
Free the User | Contain the Threat – Invincea Webinar on Friday, August 9th, 2013 at 2:00 PM EDT
What can you learn from reading the exploits of the most successful hacking ring ever brought to justice? Recently, the US Attorney’s Office in NJ unsealed their indictment against a mostly Russian