Digital Identity Guidelines Webinar (2): Innovating Identity Proofing
This second webinar in the Digital Identity Guidelines Webinar Series will focus on the changes NIST has made to the…
This second webinar in the Digital Identity Guidelines Webinar Series will focus on the changes NIST has made to the…
The first webinar in the Digital Identity Guidelines Webinar Series will center on a discussion of risk as it relates…
The initial public draft of NIST Special Publication (SP) 800-201, NIST Cloud Computing Forensic Reference Architecture, is now available for…
2.5 million people were affected, in a breach that could spell more trouble down the line.
Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance…
Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.
Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.
Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.
A data classification system is a method of organising and categorising information based on its sensitivity, value, and potential impact…
A large percentage of Tik Tok users are young girls, this demographic is ripe for scams, pornography, and personal danger…