#InfosecurityEurope: Drones Contain Over 156 Different Cyber Threats, Angoka Research Finds

The drone industry has so far failed to implement sufficient cybersecurity measures. Angoka wants to change that by applying a zero trust architecture to drone control This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #InfosecurityEurope: Drones Contain…

US Justice Department Launches New National Security Cyber Section

The primary objective of NatSec Cyber is to enhance the Justice Department’s capacity to counter malicious cyber activities effectively This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Justice Department Launches New National Security Cyber Section

6 Attack Surfaces You Must Protect

More connectivity means more potential ways into your enterprise, so securing every main attack surface is imperative. This article has been indexed from Dark Reading Read the original article: 6 Attack Surfaces You Must Protect

What Is CIAM?

CIAM stands for Customer Identity and Access Management. It refers to a system or set of processes and tools created to manage and protect the online identities of external third parties (users or customers) across a business’s different platforms, apps,…