
A unified approach is the future of data backup
Though disaster recovery and backup solutions have always been critical components for any business, the pandemic put a spotlight on the many threats to data today. Cybercrime …

Combating deepfakes: How we can future-proof our biometric identities
How worried should we be about deepfakes? What sort of threat do they pose to digital ID verification and the biometric technology that we are becoming so reliant on, and are …

Is differential privacy the ideal privacy-enhancing computation technique for your business?
As security & risk management (SRM) leaders globally adjust to a “new normal” brought about by the COVID-19 pandemic, businesses must adapt their privacy programs for …

Vaccinate your data: Addressing and adapting to new data risks
It seems like only yesterday that we were all reading up on what the implementation of the European Union’s General Data Protection Regulation (GDPR) would mean for businesses …

Protect your smartphone from radio-based attacks
By now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone …

How to strike the balance between privacy and personalization in healthcare and beyond
The trade-off between widespread technology adoption and responsible use often lies on the spectrum of privacy. When it comes to technologies fueled by data, such as …

The rise of the Developer Experience Engineer, and why it matters
In a world that increasingly relies on digital products, software development is becoming the catalyst for value creation and achieving top-line business results. At each …

The real cost of MSSPs not implementing new tech
Enterprises have plenty to manage as their infrastructures scale with a growing and increasingly complex cloud computing environment. They often bring in expert help to ensure …

Rebuilding your security culture as employees return to the office
The return to work allows security teams to refocus on areas of their insider risk management program that may have been swept under the rug while working remotely. As …

Ensuring HIPAA compliance when using the cloud
Accelerated by the pandemic, health IT has continued to innovate at pace, while having to balance data protection and regulatory rules. However, critical transformations – …

It takes more than MFA to beat human hacking
While multi-factor authentication (MFA) is a much-needed addition to an effective cyber defense strategy, it is by no means foolproof. In fact, no single security effort can …

How Microsoft is taking cloud-powered innovation beyond Earth with Azure Space
The space community is growing rapidly and Microsoft’s Space team is developing capabilities and services to meet its needs for extended connectivity across the world, …
Featured news
Resources
Don't miss
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects
- Understanding the AI Act and its compliance challenges
- The art of balancing data security with business goals
- Debunking 5 myths about network automation