Introduction If identity and access management procedures and controls are badly designed or…

Registration is now open for the NCSC’s flagship annual cyber security conference, which will…

Russian authorities have broken up a crime ring involving a hacker and willing…

A recently discovered Dridex campaign had a few peculiar characteristics, including the use…

A so-called ‘text bomb’ flaw in Apple’s iPhone and Mac computers that…

A massive mobile espionage campaign has been collecting troves of sensitive personal information…

Cloud may already be the heart of many companies’ infrastructure but it would be nothing without the veins of connectivity that keep the data flowing. The survey asked if respondents were considering moving additional applications and services to the cloud and what connectivity companies use to access their cloud solutions. This was split out from their normal office connectivity unless they relied upon an open public cloud connection.