New framework sets baseline for SaaS security controls
Managing security across dozens or even hundreds of SaaS apps has become a major headache. Each tool has its own...
Read more →Managing security across dozens or even hundreds of SaaS apps has become a major headache. Each tool has its own...
Read more →A sophisticated cybercriminal campaign has emerged targeting Indonesian and Vietnamese Android users with banking trojans disguised as legitimate government identity...
Read more →A critical stored cross-site scripting vulnerability has emerged in the popular DotNetNuke (DNN) Platform, threatening websites powered by this widely-used...
Read more →Aaron Finnis, chief strategy officer at Identity and Access Management (IAM) specialist Identifly, has echoed others in the cybersecurity industry...
Read more →Australian Gas Infrastructure Group is entering the second phase of a CRM transformation, with an end goal of establishing a...
Read more →There’s an AI Security and Safety concept that I’m calling an “AI Comprehension Gap.” It’s a bit of a mouthful,...
Read more →More than 190 internet shutdowns have been recorded in 41 African countries since 2016, the African Digital Rights Network (ADRN)...
Read more →GIO is using a digital assistant to help its Australia-based claims teams correctly route work to an offshore centre for...
Read more →OpenAI is internally testing a new version of its AI agent, which uses a special version of GPT-5 dubbed “GPT-Alpha.”...
Read more →Ahead of the official opening of identity specialist Okta’s annual Oktane customer conference in Las Vegas, Nevada, the cyber security...
Read more →Home Affairs has hired former Microsoft executive Rishi Nicolai to accelerate the development of artificial intelligence across its operations. Nicolai spent...
Read more →Two vulnerabilities affecting the firmware of Supermicro hardware, including Baseboard Management Controller (BMC) allow attackers to update systems with maliciously crafted images....
Read more →