Leading UK Fraud prevention consultancy and analyst UKFraud is calling on the insurance industry to accelerate activity in its management of fraud and fraudsters.
Browsing: Identity and access management (IAM)
A Chinese hacking group accused this February of being tied to the Chinese army was caught last December infiltrating a decoy water control system for a U.S. municipality, a researcher revealed on Wednesday.
In the wake of the press stories about government surveillance, many, including me, have pointed to tools such as Tor to protect anonymity.
In my last post I discussed Edward Snowden and his exposure of the mass electronic surveillance by the US government of its citizens via its PRISM program.
The relaxing atmosphere of surfing at the beach makes it easy to forget about the sharks. Connecting to an unsecured network poses serious risks to your laptop and data.
Google Glass, for all its promise, has some scary implications. Here is my list of 5 potential challenges we face with Glass:
In 1995, Nick Leeson aptly demonstrated the damage a single rogue employee can bestow on an unsuspecting organisation.
The UK government is to invest more than £850m to develop and maintain what it calls “cutting-edge” capabilities to tackle cyber threats.
Morphing existing IT security policies to accommodate for bring your own device (BYOD) is the wrong way to address BYOD, according to IBM Institute for Advanced Security director, Glen Gooding.
White House Employees fell victim to the Syrian electronic Army’s Social Engineering attack – Their personal email accounts have been hijacked by Syrian Electronic Army.