Sell tickets to Fans, Not to Bots.
By PJ Rohall, Head of Fraud Strategy & Education – SEON It can be upsetting when you try to purchase a ticket for an event…
By PJ Rohall, Head of Fraud Strategy & Education – SEON It can be upsetting when you try to purchase a ticket for an event…
Looking for a tool to validate if your Active Directory (AD) passwords are safe across your Enterprise? Why would this be important? There are a…
Technology is ever on the march to the future and with it comes more sophisticated and persistent cybercriminals.The digital arms race is ongoing, but cybersecurity…
By Tomasz Kowalski, CEO and Co-Founder, Secfense For decades, cybersecurity experts have been warning us against weak or stolen passwords. Two-factor authentication (2FA) has always…
By Dr. Allen Badeau, Chief Technology Officer, Empower AI The White House recently launched an “AI Bill of Rights” framework to lay the groundwork for…
Abstract: The BB84 quantum key distribution (QKD) protocol is based on the no-cloning quantum physic property, so if an attacker measures a photon state, he…
Moving to Zero Trust Architecture as a standard By Jim Hietala, Vice President of Business Development and Security at The Open Group There’s a huge…
Ben Rothke, CISSP, CISM, CISA, is a Senior Information Security Manager at Tapad Going to RSA 2023? Failing to plan is planning to fail. With…
By Scott Register, Vice President, Security Solutions, Keysight Technologies We’ve all seen the rush to deploy the new wave of connected devices but the speed…
Understand the limits of data consent when sending cold emails By Tim Green, Cybersecurity Specialist Cold emailing is an important marketing technique for any business…
Europe’s cyber industry has huge potential. Copying what’s worked in the US is a route to realising that promise. By Carlos Moreira Silva and Carlos…
Digital identity is an extra layer of security needed to protect your organization’s document and workflows. Here’s how it works and why it matters. By…