Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




When it comes to free internet services, that often means that you’re paying by providing data that may be far more valuable than the fees...


Blockchain is widely regarded as a disruptive technology that revolutionized the financial industry due to its use for creation of...


We reached out to the experts to get insight into the nature of ransomware attacks and what steps businesses should take to protect their...


All about the work of an Information Security Engineer.


To think we’ll be able to completely avoid smart devices to protect our privacy seems far-fetched. So gather as much information as you can...


We'll take a detailed look into the typology of cryptomining malware, and discuss five of the biggest crypto-malware attacks. Plus, we'll...


New hacking tools and techniques are on the verge of breaking even the most hardened data protection capabilities of today. Fortunately,...


While some technologies exacerbate the problem of fake art on the market, another technology advancement may solve it. Blockchain has...


Being proactive about cybersecurity for remote work will pay off in averting data breaches and headaches down the road.


The challenges in 2020 and beyond that Identity and Access Management addresses may turn out to be footnotes — or may change the way we...


Could creating a backdoor or skeleton key for law enforcement create more problems than it solves? Learn how encryption affects privacy...


With large numbers and cases of security breaches affecting the world, it's obvious that we need to find more secure solutions other than...


Proper data protection is a must for any enterprise, but in the healthcare industry it can become a matter of life and death.


Cryptography is a game that everyone has to play — and it’s still evolving in the age of quantum computing and AI.


As quantum technology becomes a reality, this cybersecurity quandary has become a true cat vs. mouse game. It’s too early to predict how...


What's happening in the field of biometrics? Some people would say: not much. Some others, who are closer to the industry, would say a lot...


In truth, encryption is rooted in practices that date back thousands of years. The technology and codes have changed, but some of the...


Since cyberattacks have ramped up over the past few years, data encryption needs to keep pace. But what advancements should be considered...


Encryption backdoors will clearly and overwhelmingly jeopardize the privacy and security of everyone. The government should ponder on the...