I-Generative Data Intelligence

Tag: Identity

Why do Hackers Hack Websites? And How do You Protect Yourself From them?

Reading Time: 3 minutesThere are many reasons behind why hackers target websites. Years ago, hackers did it out sheer vanity. To prove that...

Blockchain Technology | Amit Modi

Blockchain is an emerging way for businesses, industries, and public organisations to almost instantaneously make and verify transactions—streamlining business processes, saving money, and...

Microsoft and Accenture Dublin Blockchain team prototype Identity Scheme

As reported in EthNews, the Accenture Blockchain Lab in Dublin has partnered with Microsoft to build a prototype blockchain based identify scheme under...

Izici Ezinhle Ezingu-10 Zesu Lokuphepha Lephoyinti Lokugcina Eliphumelelayo

Reading Time: 4 minutesWith overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security measures...

Izici Eziphezulu Eziyi-10 Zesu Lokuphepha Lephoyinti Eliphumelelayo lango-2020

Reading Time: 4 minutesWith overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security...

Qaphela Umkhonyovu Wekhadi Lesikweletu Lehhotela

Ngolunye usuku futhi omunye umkhonyovu uyazungeza. Kulokhu iqondiswe kubaxhasi bamahhotela. Njengawo wonke umkhonyovu lo...

SSL/PKI/X.509—Automated Digital Certificate Lifecycle Management Reduces Risk and Costs

Reading Time: 3 minutesWhile SSL/TLS certificates provide the backbone for information security—digital certificate management is going to get harder as enterprises turn to...

Comodo One. Understanding Service Desk

Reading Time: 40 minutesComodo One. Understanding Service Desk How to add a user in staff panel? The “User Directory” under the “Users” tab lists all...

Comodo Detects New Family of Sophisticated Financial Malware

Reading Time: 3 minutesComodo Threat Research Labs (CTRL) has announced that it has detected a new family of financial malware dubbed as “Gugi/Fanta/Lime”....

Protect Yourself Against Identity Theft

Reading Time: 2 minutesYahoo has been hacked. LinkedIn has been hacked. Accounts have been stolen. Identities have been stolen. Identity theft is said to...

Izinkontileka ezihlakaniphile kanye nokufakwa kwe-DAO

The tragic combination of inevitable bugs and immutable codeLast week witnessed a catastrophic event in the Ethereum ecosystem, when The DAO, a smart...

Four genuine blockchain use cases

Where shared ledgers add real value in enterprise IT Almost a year after first releasing MultiChain, we’ve learnt a huge amount about how blockchains, in...

Latest Intelligence

indawo_img
indawo_img
indawo_img

Xoxa nathi

Sawubona lapho! Ngingakusiza kanjani?