Where, when, and how people work has dramatically changed. Remote work trends are here to stay while fewer employees than...more
Security

Report: Digital trust is critical, but many enterprises are not prioritizing it
One breach of digital trust can cause devastating reputational, regulatory and financial repercussions, according to ISACA’s State of Digital Trust...more

How does data governance affect data security and privacy?
While it's important to implement processes and procedures that safeguard data security and privacy, you can also focus on more...more

North Korean cyberespionage actor Lazarus targets energy providers with new malware
Image: Adobe Stock Lazarus, also known as Hidden Cobra or Zinc, is a known nation-state cyberespionage threat actor originating from...more
Start Your Zero Trust Journey With Identity
Cybersecurity is a serious concern for every organisation today. With 61%1 of cyberattacks now involving stolen or weak credentials, IT...more
Your Account Takeover Prevention Checklist: 5 Steps to Minimise the Risk
Our personal data is valuable to criminals – and they’re making more attempts than ever to get hold of it....more
Goodbye Friction, Hello Flow: 6 Ways to Build Trust with Strong Customer Authentication
Virtually every business today is a technology business, relying on digital services in some way to serve and support their...more
Achieving Pervasive Security Above, Within and Below the OS (German)
It seems that every few months, another prominent global brand experiences a major security breach and the negative public exposure...more

Secure Access Service Edge: Trends and SASE companies to watch
Image: Ar_TH/Adobe Stock Control and safety go hand in hand, as people feel safer when they feel in control of...more

Ransomware makes use of intermittent encryption to bypass detection algorithms
Image: Adobe Stock Most cybercriminals running ransomware operations are under the spotlight. Not only are they investigated by law enforcement...more