Please turn on your JavaScript for this page to function normally.
account
Verifiable credentials are key to the future of online privacy

To realize the full potential of online services, identity verification solutions are required to avoid fraud and boost trust in the systems, for both end users and …

Terminal
Ignore API security at your peril

Application programming interfaces (APIs) are at the core of nearly every digital experience – whether that is the delivery of mobile apps that enable consumers to …

Questions that help CISOs and boards have each other’s back

Boards of directors and executives seem increasingly interested in understanding their companies’ security posture. And why wouldn’t they be? The ransomware threat posed by …

complex
Asset inventory management: What’s the ROI?

Asset inventory management is critical to any company’s planning and accounting process. Having an accurate, up-to-date view of every asset (all devices, equipment, vehicles, …

backup
A unified approach is the future of data backup

Though disaster recovery and backup solutions have always been critical components for any business, the pandemic put a spotlight on the many threats to data today. Cybercrime …

fake
Combating deepfakes: How we can future-proof our biometric identities

How worried should we be about deepfakes? What sort of threat do they pose to digital ID verification and the biometric technology that we are becoming so reliant on, and are …

identity theft
Is differential privacy the ideal privacy-enhancing computation technique for your business?

As security & risk management (SRM) leaders globally adjust to a “new normal” brought about by the COVID-19 pandemic, businesses must adapt their privacy programs for …

syringe
Vaccinate your data: Addressing and adapting to new data risks

It seems like only yesterday that we were all reading up on what the implementation of the European Union’s General Data Protection Regulation (GDPR) would mean for businesses …

iPhone
Protect your smartphone from radio-based attacks

By now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone …

medical
How to strike the balance between privacy and personalization in healthcare and beyond

The trade-off between widespread technology adoption and responsible use often lies on the spectrum of privacy. When it comes to technologies fueled by data, such as …

mind map
The rise of the Developer Experience Engineer, and why it matters

In a world that increasingly relies on digital products, software development is becoming the catalyst for value creation and achieving top-line business results. At each …

MSSP
The real cost of MSSPs not implementing new tech

Enterprises have plenty to manage as their infrastructures scale with a growing and increasingly complex cloud computing environment. They often bring in expert help to ensure …

Don't miss

Cybersecurity news