News

Hackers don't break in—they log in. Credential-based attacks now fuel nearly half of all breaches. Learn how to scan your Active Directory for compromised passwords and stop attackers before they ...
Windows administrators from numerous organizations report widespread account lockouts triggered by false positives in the ...
As enterprises continue to adopt SaaS applications at an exponential pace, identities—both human and nonhuman—will remain the ...
Lasaco Assurance Plc has revealed that it has obtained the ISO/IEC 27001:2022 certification, a globally recognised benchmark ...
REAL ID is a federal security credential added to state-issued driver's licenses and identification cards, marked by a gold ...
Information Security Management SystemsIssued by iiDENTIFiiJohannesburg, 14 Apr 2025Visit our press officeMarco Wagener, Chief Technology Officer at iiDENTIFii. (Image: Supplied) iiDENTIFii, Africa’s ...
Among the most alarming ways for criminals to use AI against executives is deepfake technology. Now a weaponized tool for ...
ISO/IEC 27001 sets out the criteria for establishing, implementing, maintaining, and continually improving an ISMS. It ...
Businesses that handle digital payments must absolutely protect their customers’ payment data. Companies that handle payment ...
This achievement highlights the bank’s commitment to safeguarding customer data, and enhancing cybersecurity measures ...
A new report out today from IBM Corp. shows that cybercriminals are evolving their tactics, increasingly opting for stealth ...
Understand what happened in the Oracle Cloud Infrastructure (OCI) breach and potential mitigation strategies powered by ...