All About Identity and Access Management

An open forum to share views about Identity Management, Access Management and Access Governance.

Malware attacks


It is malicious software as unwanted software which is installed in your

systems without your concern. It can attach itself to legitimate code.

Types of attacks;

Mitigations for these attacks: