The password is probably the best known concept in computing. Probably you will only find people who don't know the word in the most remote areas around the globe. Even the Romans were known to use passwords to guard entry to secure their army camps.
2019
With the rise of IoT devices in the workplace, it is becoming increasingly important for companies to build secure IoT structures. Secure networking is business-critical for enterprises, service providers, financial institutions, government agencies, and healthcare organizations ...
If you leave out Germany – which is well-known for taking a strict approach to privacy concerns, cloud growth figures are impressive. This year, cloud service revenue is expected to reach USD 212 billion, up from 182.4 billion dollars in 2018.
Risk to Business Travelers’ Data Grows
Business travel is a fertile hunting ground for hackers. Sensitive company data is seldom more at risk than when employees are on the road. The travel sector is notoriously susceptible to large scale data breaches. Moreover, new threat vectors are emerging to add to traditional ...
A risky business: what happens when transferring risk goes wrong?
The title of this article might seem a little confusing so let's start by breaking things down. Once a risk analysis has been conducted and the risks facing a company have been identified, for example the fundamental vulnerability of systems to malware, each risk must be ...
Tech Giants Talk the Data Privacy Talk
The reputation of Silicon Valley’s elite brands is in urgent need of repair. In recent years, data scandals from breaches of personal information to alleged interference with democratic elections have repeatedly made the news headlines.