IT Governance Podcast 25.8.23: Tesla, Duolingo, Lapsus$ trial
This week, we discuss “insider wrongdoing” at Tesla, a data breach affecting 2.6 million Duolingo users and the conclusion of…
This week, we discuss “insider wrongdoing” at Tesla, a data breach affecting 2.6 million Duolingo users and the conclusion of…
What is Clone Phishing and How Do I Avoid It? IdentityIQ Nowadays, cyber threats are something we can't ignore –…
What To Do with Old Computers to Protect Your Identity IdentityIQ Imagine your dusty old computer, tucked away in the…
Debt Snowball or Debt Avalanche: Which Debt Repayment Method is Right for You? IdentityIQ Whether it's personal loans, student loans,…
7 Internet Safety Tips for Safer Internet Browsing IdentityIQ With the internet, we can access vast amounts of information with…
A new State of SaaS Security Posture Management Report from SaaS cybersecurity provider AppOmni indicates that Cybersecurity, IT, and business…
A previously undocumented threat cluster has been linked to a software supply chain attack targeting organizations primarily located in Hong…
A new variant of an Apple macOS malware called XLoader has surfaced in the wild, masquerading its malicious features under…
Software services provider Ivanti is warning of a new critical zero-day flaw impacting Ivanti Sentry (formerly MobileIron Sentry) that it…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw in Adobe ColdFusion to its Known…