Understanding The Concept of Privacy By Design
By Danijela Obradovic, Lawyer at Roberts & Obradovic “Privacy by Design,” a concept first introduced by former Ontario Information and...
Read more →By Danijela Obradovic, Lawyer at Roberts & Obradovic “Privacy by Design,” a concept first introduced by former Ontario Information and...
Read more →By Dotan Nahum, Head of Developer-First Security at Check Point Software Technologies Here’s a quick-fire question: do you know where...
Read more →Baselining your security by adopting a standard such as Cyber Essentials, Cyber Essentials Plus or the ISO 27001 standard can...
Read more →Cyberattacks on city and municipal governments are on the rise, more than double that of a year ago. The increase...
Read more →By Gregory Hoffer, CEO, Coviant Software Everyone knows someone who is a vintage car nut. They keep their baby in...
Read more →Abstract: Wireless sensor network (WSN) is the Internet of Things by a large number of sensors in the external physical...
Read more →By Christoph Nagy, CEO of SecurityBridge To detect attacks on SAP, you need to evaluate the security logs in SAP....
Read more →The need for the cybersecurity industry to work together in order to combat the rising threat of cybercrime. By Brendan...
Read more →By Filipe Beato, Cyber Resilience Lead at the World Economic Forum`s Centre for Cybersecurity and Natasa Perucica, Research and Analysis...
Read more →By Christoph Nagy, CEO of SecurityBridge It must have been a few years ago that I participated in a webinar...
Read more →It cannot have escaped you that the word trustworthy has been added to the cybersecurity lexicon in recent years: trustworthy...
Read more →By Mohit Shrivastava, ICT Chief Analyst at Future Market Insights Blockchain technology is becoming more popular owing to the various...
Read more →