Please turn on your JavaScript for this page to function normally.
Door
Encryption is either secure or it’s not – there is no middle ground

The principle of end-to-end encryption underpins a system of communication where only the communicating users can read the messages. To this end, it exists to prevent any …

fist
What businesses need to know to evaluate partner cyber resilience

Many recent high-profile breaches have underscored two important cybersecurity lessons: the need for increased scrutiny in evaluating access and controls of partners handling …

Healthcare
Data breaches and network outages: A real and growing cost for the healthcare industry

One year into the COVID-19 pandemic, the Infoblox report reveals major challenges the healthcare industry faced as IT workers scrambled to secure protected health information …

hands
Data protection challenges hinder digital transformation initiatives

Data protection challenges are undermining organizations’ abilities to execute digital transformation (DX) initiatives globally, according to the Veeam report, which has found …

network
The democratization of the workplace through edge computing

It’s been a year since we first learned about COVID-19, but the pressure on businesses to accelerate their digital transformation (DX) efforts has not abated. Of particular …

face
Why data privacy will be the catalyst for digital identity adoption

Most of us probably don’t think of buying a bottle of wine as a security risk. However, we inadvertently give away our address, surname, nationality and signature – …

data
Compromised devices and data protection: Be prepared or else

The January 6 riot and storming of the U.S. Capitol demonstrated just how quickly and unexpectedly our devices can fall into the wrong hands. The allegation that one rioter …

building
Security starts with architecture

The battle against hackers and threats is an arms race against highly motivated opponents, and with the number of attacks and threats continually growing, it’s …

Amazon Alexa
Alexa Skills: Security gaps and data protection problems

With the voice commands “Alexa Skills,” users can load numerous extra functions onto their Amazon voice assistant. Amazon screens special voice assistant functions for …

search
Closing the data divide: How to create harmony among data scientists and privacy advocates

Balancing data privacy within an organization is no easy task, particularly for data scientists who need quick access to data, and security and governance teams whose job it …

identity
Five factors driving investment in IDV

For billions of individuals around the world, digital identity became critical in 2020. As a result, the global identity verification market, which was already growing rapidly …

2021 will be the year of hybrid working: How can CTOs keep staff secure and productive?

In 2020, the pandemic was a radical turning point in the way we work. Office workers were forced to give up their commute and work from home. People from a whole range of …

Don't miss

Cybersecurity news