BACKGROUND: Reuters is reporting that The US Commerce Dept. has put Israel’s NSO Group and Candiru on its trade blacklist…
Browsing: Identity and access management (IAM)
New hybrid work models are causing significant shifts both in where employees work and in how organisations procure technology. In…
It is now inevitable that the encryption algorithms used to secure vital data across the world – from defence and…
BACKGROUND: It has been reported that some of the world’s most powerful, wealthy and famous people are thought to have…
Today 1st November, monetising YouTube channels will be required to set up 2-Step verification– if this has not already been set…
BACKGROUND: Researchers at the Lookout Threat Lab provide a highly detailed review of new rooting malware distributed in fully functioning…
BACKGROUND: It has been reported that Papua New Guinea’s finance department has been hit with a ransomware attack, locking access to…
Cybersecurity experts at Proofpoint are warning the public of a wave of email attacks related to Netflix’s hit show ‘Squid…
The cybersecurity landscape continues to evolve rapidly, due, in large part, to the way our lives have changed during the…
Over the past two years there has been a dramatic shift in the way organisations operate. With the coronavirus pandemic…