Our seven most-read stories from the past seven days. 7. Who should take the blame for a data breach? When the data doodoo hits the fan who should be responsible for cleaning it up and then, possibly,...
Testers have to be destroyers, argues Mark Wilson. But too often testers aren't trying too hard to bust the software. Rather, they are trying to show it working
'Working' from home? Furloughed? Why not while away the hours with some of these great games
Websites trading in stolen debit and credit cards, as well as personal information, have gone dark following raids last week by the FSB
It will use a light pattern recognition module to determine the face of the user
Working from home, staying secure: 14 Identity & Access Management tools to deal with the coronavirus fallout
With record numbers working remotely during the COVID-19 crisis, CIOs and CISOs must look at how to maintain identity and access securely across a dispersed network