How to Close the Security Gap Between Identity and Access Management (IAM) and Shared Accounts
By Maurice Côté, Vice President of Business Solutions, Devolutions For more than half a century, passengers of London’s […] The…
By Maurice Côté, Vice President of Business Solutions, Devolutions For more than half a century, passengers of London’s […] The…
By Nicole Allen, Marketing Executive, Salt Communications. Cyberattacks have been on the rise for years, and the trend […] The…
By Ryan Ayers, Consultant Cyber attacks cost the global economy more than $1 trillion last year, making it […] The…
Experts believe that the arrest of Ilya Sachkov, the founder and CEO of Group-IB, will not affect the company's work,…
In the past few years, two-factor verification is one of the simplest ways for users to safeguard their accounts. It…
The Japanese government on Tuesday officially approved a new three-year cybersecurity strategy, where Russia, China and North Korea are mentioned…
One of the prominent targets for hackers is Microsoft Exchange, and the attack vector typically involves a popular vulnerability which…
Positive Technologies is developing a new concept of cyber security standard. The document should become an open knowledge base, which…
Cybersecurity researchers spotted a new version of the Jupyter infostealer which is distributed via MSI installers. Cybersecurity researchers […] The…
At least five French ministers and President Emmanuel Macron's diplomatic advisor mobile phones have been infected by Israel-made Pegasus spyware,…