There is no question that digitalisation has brought newfound opportunity to businesses; however, as we are all painfully aware, it…
Browsing: Identity and Access Management (IAM)
(ISC)² Opens Call for Expert Cybersecurity Speakers for 2020 Security Congress Annual conference brings together experts from around the world…
People are abuzz right now with trend predictions for 2020. It’s like putting the cart before the horse. Before we…
Criminal gangs are planting “sleepers” in cleaning companies so that they can physically access IT infrastructure, the lead officer of…
The Japanese NEC electronics giant was the target of a cyberattack that resulted in unauthorized access to its internal network on…
Cnet reported late today that a major Facebook data partner was hacked to gain access to advertising accounts and operate credit…
Connectivity as a concept has become an essential part of life, as opposed to just a luxury. The Internet of…
It has been reported that an antivirus program used by hundreds of millions of people around the world is selling highly sensitive web…
Hackers could eavesdrop on scores of Zoom Meetings by generating and verifying Zoom Meeting IDs; Zoom rolls out a series…
Artificial intelligence (AI) has become integrated into our everyday lives. It powers what we see in our social media newsfeeds, activates facial recognition…