Insights and opinions on data protection, privacy and cybersecurity contributed by thought leaders from around the world.
With the significant increase in the number of cyberattacks, focus of employees returning to the office should not only be…
As the technology that supports the modern workplace expands, so do the needs for identity management and credential assurance. Rigorous…
While VPNs do function well when it comes to tunneling and encrypting data from authorized users, there are a couple…
In March, electoral data for 75% of the Maltese population was exposed in a data breach, including their polling booth,…
Digital identity verification connected to a government-issued identity document can help organizations confirm who users claim to be and regulate…
Ensuring data privacy and compliance with regulations like the CCPA involves layered, complex challenges for any business especially in the…
Almost 30 million website owners choose Google Analytics to gather data about their visitors. But even if you trust Google’s…
RF-enabled devices are now prevalent in the enterprise and RF security is getting harder to enforce in secure facilities that…
Those little automated data tracking mechanisms are subject to special treatment, consent, opt in and opt out requirements. Have you…
As enterprises work to weather the COVID-19 crisis, they are applying the lessons learned to strengthen their cyber resilience, and…