A collection of 9 posts
Juice Jacking: Is it a Real Threat?
Lots of people can relate to their phone running out of battery when outdoors. Thus, the development of public charging stations was a perfect solution for this. However, the threat of 'juice jacking' has recently been raised, prompting some to worry whether it is wise to use public charging points.
CVEs: How Keeping a Catalogue of Common Vulnerabilities and Exposures Helps Your Company
Since we began to store data in computers, there has been a concern to keep this information safe. The tremendous growth of access to computers, tablets, and smartphones has increased the number of threats to protecting everything saved on these devices or through them on the cloud. Launched in 1999,
Why IAM Architects Prescribe Enterprise Application Security
Since the wave of digitization is sweeping businesses, managing an enterprise has become a much easier task. Enterprises now utilize applications or software like Customer Relationship Management or CRM, project management applications, ERP, and more to carry out several business-critical tasks. However, the widespread use of these applications may also
Consumer Identity Management is an important security tool for an IoT ecosystem
The Internet of Things (IoT) is creating an exciting new world of new and improved experiences for all. It necessitates the management of exponentially more identities than current CIAM systems can handle. CIAM is no longer primarily concerned with managing consumers but also with managing the hundreds of thousands of
Do Cybercriminals Already Have Access To Your Email?
Cybercriminals often make use of email-based attack campaigns to target all kinds of organizations. They use mail servers, choking spam, and scam emails loaded with malicious software developed to interrupt business procedures. Despite being generally aware of some methods to spotting spoofed emails, many professionals still fail to detect these