-
Cybersecurity in 2024: Five Trends in the Future
Cybersecurity is dramatically evolving. With weaponization, talent crunch, and increased ransoms, 2024 will be an scary year. Here are my…
-
Important Considerations Before Using Biometrics For Authentication
While ordinary data breaches have become a staple of our lives. Yet, most of them involve data you can change.…
-
Doom Cryptocurrency to Secure IT. Are Bitcoins the Problem?
Recently, there has been a push to ban Cryptocurrencies in the name of improving Cybersecurity. What to make of it…
-
Expert Panel: Identity And Access Management: 18 Important Trends And Considerations
With the rise of digital workspaces and marketplaces, having a firm grip on identity and access management is a must…
-
Incident Response: How to Loose Two Billion Dollars
Okta’s data breach can provide a great learning opportunity for management and boards. Let us look into three takeaways of…
-
Data a High Tech Hostage: Data Theft and Ransom
Recently, a customer received a ransom note threatening that criminals would sell all company data. How common are these attacks,…
-
Expert Panel: Small-Business Cybersecurity: 20 Effective Tips From Tech Experts
Keeping IT running in an SMB is hard. Keeping it secure is even more challenging. Find out what 20 experts…
-
Epic Fights against Ransomware: The Courage of Going All-In
The ransomware attack against the MGM Casinos has dominated the cybersecurity news over the last few days. Was fighting it…
-
Expert Panel: 20 Questions To Ask A SaaS Vendor
It’s essential to ask a series of important questions—and it’s also essential that the potential SaaS vendor can give satisfactory…
-
Clone Me: Data Ownership In The Age Of AI
AI has started to supercharge scams, and with the data we share on social media, it is becoming far too…
