How open source solutions support cloud security
The responsibility for software security has shifted “to the left,” placing increased expectation on developers for the security of cloud native applications. Open Source to the rescue!
Read more...The responsibility for software security has shifted “to the left,” placing increased expectation on developers for the security of cloud native applications. Open Source to the rescue!
Read more...Personal identity information (PII) is more vulnerable than ever, so securing it becomes more important. CPM gives an overview of current and future solutions.
Read more...The Metaverse is the decentralized web so you keep control of your data….…
Read more...Traditionally, security architectures focused on protecting the network. In a connected world, this approach is no longer effective. A zero trust security architecture is essential for every organisation.
Read more...Criminals increasingly turn to the weakest link in the security chain – people. Social Engineering attacks are on the rise. Read about what social engineering is, its most common forms and, of course, how to counter it
Read more...Hackers have a new way of stealing data: impersonating members of law enforcement agencies and making emergency data requests (EDR) for information.
Read more...The Russian cyber offensive against the West finally hit last week and it was a pretty weak phishing scam.
Read more...Today is Identity Management Day. With 79% of all organisations having experienced an identity related security breach, this is an issue that must be taken seriously.
Read more...Thanks to Vlad “The Invader” Putin, the EU, UK and US are fast-tracking cyber laws. But some experts think the laws and regulations lack proper incentives beyond fines and prosecution.
Read more...Biometrics is a hub for personal security, identity theft and government surveillance. Protecting that stuff is kind of important. One way to do that is by decentralizing it.
Read more...