Eighty-one percent believe cyber attackers will target machine communications from local polling stations to central aggregation points Venafi®, the leading…
Browsing: Strategy and Planning
A threat actor that is relatively new to the scene relies on open-source tools for spear-phishing attacks designed to steal credentials…
Reddit has been in the news, following an incident where users’ log in details were compromised. IT security experts commented below.…
Iowa’s UnityPoint Health has revealed it was the victim of a phishing attack that put the sensitive medical information of 1.4 million…
Yale officials are confirming Social Security Numbers Accessed in Yale University Data Breach. NBC reports the breach occurred between April 2008 and January 2009,…
It has been reported today that Dixons Carphone has announced that the huge data breach that took place last year involved 10 million customers,…
Facebook’s departing head of security, Alex Stamos, wrote a memo amidst the Cambridge Analytica scandal, calling for Facebook to collect less user…
It has been reported that IBM has patched a critical vulnerability in Apache OpenWhisk, the open source serverless platform that IBM uses to run its…
There is no such thing as ‘designing an artificial intelligence (AI) strategy’ because AI should be part of the business…
One year on from the global outbreaks of WannaCry and NotPetya, which established ransomware as one of the most notorious…