Hackers exploit QR codes in PDF e-mail attachments to steal company credentials from mobile devices.
IAM takes the chaos out of access control, empowering enterprises with streamlined operations, robust security and seamless user experiences, says Georgina van den Heever, content marketing co-ordinator at ITR Technology.
The public works and infrastructure department enlists the Hawks and State Security Agency, as it tries to curb further losses due to what it terms a “Sage breach”.
Balance regulatory obligations with optimal results.
Five things you can do right now to protect your business.
The new standards require financial institutions to implement comprehensive cyber security frameworks, policies and governance practices to secure their operations.
The scheme uses legitimate employee names to deceive companies into accessing fraudulent websites, putting sensitive data and financial assets at risk.
Academia, government, and industry unite to safeguard kids from cyber crime and harmful content.
Companies that depend on security controls associated with traditional monitoring solutions often lack visibility into their technology assets.
With cyber crime on the rise, it is imperative to implement new, intelligent privilege controls.
The 'Juice' agenda was tailored to address how companies can actively combat cyber crime beyond the traditional tactics of monitoring and reporting.