From the integration with CloudKnox, AWS IAM Access Analyser is a new function that analyses resource policies to help administrators and security teams protect their resources from unintended access.
Balaji discovered that organisations were predominantly relying on role-based access controls (RBAC) to solve their growing identity privilege challenge.
A recent BBC report highlights the importance of defending mobile devices that can access corporate data from not just obviously rogue apps (e.g. blocking sideloading) but also seemingly ‘good’ apps that may contain recycled code.
Reports this week have announced that computers at the DCH medical centres have been infected with ransomware. Three hospitals that make up the group in Alabama were closed to new patients as the attack paralysed the health network’s computer system.
With a new direction comes a fresh new look and feel. We’ve invested a huge amount of the time in understanding the key features of each product and solution, whilst using our knowledge and insights to match these to our customer’s requirements.
Apple has held a special event in the first half of September to announce the arrival of the latest iPhone and Apple Watch model and the annual major release of iOS.
Big businesses that are not just at risk from cyber attacks or data breaches. Smaller businesses can be more vulnerable with even larger consequences.
A major challenge for many businesses is Cyber Security. Cybercriminals are more adept at developing malware since the days of anti-virus solutions and firewalls.
Over two years ago the first that many of us heard about this was when it was announced that a number of NHS Trusts were experiencing some kind of cyber-attack.
One of the largest data breaches that hit law firm Mossack Fonseca is understandably high profile. Over 11.5 million documents, 2.6TB of data and disclosures, what lessons can businesses learn from it?