Live webseminar- 7th November at 3pm Register here Effective IT security is much more about proper management than it is about shiny new technologies. Risk Based Security Management (RBSM) can...
Six per cent of Google Cloud buckets are misconfigured and vulnerable to unauthorised access, research reveals
Finding exposed cloud databases on internet is not a difficult job, according to researchers
Post-Covid-19, security is no longer an ‘IT issue’ – it’s a C-suite item and a fundamental strategic priority
The holy grail of I&AM is to actually improve the user experience while making the business more secure, but most organisations are a long way from that
Chinese state-sponsored cyber actors are targeting bugs in F5, Citrix, Pulse and Microsoft Exchange Servers, US agencies warn
Organisations need to patch their systems immediately, they advise
The vulnerability could allow an attacker to have access to an organisation's Active Directory domain controllers