Unchecked admin rights a top threat to enterprises

While IT security professionals recognize the threat posed by unwitting employees, many still admit to allowing administrative privileges to go unmanaged, making organizations increasingly vulnerable to malware exploits and unauthorized software, accor…

Read More >>

CESG publishes identity proofing guidelines

Access management is designed to allow only authorized digital identities to gain access to a system. But a digital identity is nothing more than “a collection of attributes that uniquely define a person or organization.” Proofing is the process of ens…

Read More >>

Adware: the most pervasive mobile threat

A new examination of mobile threat data from the Lookout Platform in five countries has found that threats to consumers run the gamut, from annoying to extremely invasive. The study has uncovered that adware and malware threats like spyware, surveillan…

Read More >>

Connected TVs open up a host of threat vectors

In today’s world, everything from refrigerators to cars are beginning to get “connected” and given the ability to talk to you and to other things via broadband networks. Much of this still seems like science fiction, but when it comes to connected TVs,…

Read More >>