|
GUEST OPINION by Jim Cook, ANZ Regional Director, Attivo Networks: With cybercriminals always on the hunt for new ways to mount attacks, organisations are paying more attention to the weaknesses that exist within many deployments of Microsoft’s Active Directory (AD).
Global organisations are struggling to maintain consistent application security across multiple platforms, and they are also losing visibility with the emergence of new architectures and the adoption of application program interfaces (APIs), according to one security solutions vendor.
The International Telecommunication Union (ITU) is set to launch new 2020 guidelines on Child Online Protection (COP), re-designed from the ground up to reflect what the ITU says are the significant shifts in the digital landscape in which children find themselves, such as the Internet of Things, connected toys, online gaming, robotics, machine learning and artificial intelligence.
"The first patches for Rust support in the Linux kernel have been posted and the man behind the kernel says[…]
Raven or Activision in the week of the 16th of March changed their policy forcing anyone without 2 factor authentication[…]
Google proving yet again that in the last two-three decades, technocrats have only learned how to better exploit division in[…]
I have unlimited 100/40 with tpg for $89 a month (about the same as or less than ADSL with TPG[…]
She didn't walk away empty handed, she got a partial win which meant she got 50% of the prize value