Today, I posted a blog entry to the Oracle Identity Management blog titled Next Generation IDaaS: Moving From Tactical to Strategic.
In the post, I examine the evolution of IDaaS and look toward the next generation of Enterprise Identity and Access Ma…
Spam Volume Falls in 2015
Financial institutions such as banks, payment systems and online shops were attacked most often with phishing emails.
PCI DSS 3.2 Expected as Soon as March
Card data security standard is moving to smaller update cycle
One-Third of IT Staff Are Hackers
33% of respondents in a survey admitted to successfully hacking their own or another organization.
Akamai Bot Manager Takes Aim at Bot Traffic
60% of an organization’s Web traffic may be generated by programs that operate as an agent for a user or another program.
Instagram Set to Switch On Two Factor Authentication
Photo sharing network finally gets serious about account security
Dark Web Experiment Shows How Hackers Use Stolen Credentials
With a stolen Gmail username and password combo, hackers showed that they could access bank accounts and more.
IoT Woes: SimpliSafe Home Security System Opens to Thieves
All keypads and base stations will need to be replaced in order to secure the system.
Dridex Gang Gets ‘Locky’ with New Ransomware Campaign
Researchers discover new malicious macro-based threat
Dridex Gang Gets ‘Locky’ with New Ransomware Campaign
Researchers discover new malicious macro-based threat