Secure Enterprise Collaboration Tools Are Critical in Light of Remote Work and Cyber-Attacks.
By Allen Drennan, Principal and Co-Founder of Cordoniq Cyberattacks escalated in 2022 as critical industries remain a frequent target of...
Read more →By Allen Drennan, Principal and Co-Founder of Cordoniq Cyberattacks escalated in 2022 as critical industries remain a frequent target of...
Read more →It’s Time to Get Proactive About Risk Reduction By Marc Gaffan, CEO of IONIX The first quarter of 2023 is...
Read more →River Publishers has announced the best paper of 2022 for the Journal of Cyber Security and Mobility, which was awarded...
Read more →By Monica Oravcova, COO and Co-Founder of Naoris Protocol The recent Killnet cyberattack that disrupted contact between NATO and military...
Read more →By Zac Amos, Features Editor of ReHack Identity and access management (IAM) refers to the policies, procedures and technologies used...
Read more →Abstract: A tropical encryption scheme is analyzed in this paper, which uses double key exchange protocol (KEP). The key exchange...
Read more →By John A. Smith, CEO of Conversant Group Where it comes to owning responsibility for cyber risk, executive leadership has...
Read more →By Sitaram Iyer, Senior Director of Cloud Native Solutions at Venafi Financial services may be an industry in which mainframes...
Read more →Cybersecurity Practices Must Be A Top Priority For Firms This Busy Season By Alan Hartwell, Chief Technology Officer at IRIS...
Read more →By Mark Sincevich, Federal Director of Illumio Data compromises hit record numbers in 2021 with 1,826 occurrences reported, up 23...
Read more →Insider threats are a growing phenomenon, but many businesses aren’t yet doing enough to protect themselves effectively. In Europe and...
Read more →How To Prepare for the Regulations of Tomorrow By Jason Elmer, Founder and President of Drawbridge It is no secret...
Read more →