What does a holistic cybersecurity strategy look like?
IT and advanced technologies are no longer solely responsible for the security of our digital assets.... Read more

IT and advanced technologies are no longer solely responsible for the security of our digital assets.... Read more
The Internet of Things offers us new ways to build potential value and offer it without... Read more
Most traditional security systems and products are built to address known threats. When they see and... Read more
The 15th edition of the World Economic Forum’s Global Risk Report is out. Alongside recognizing the... Read more
Toward the end of 2019, the cybersecurity workforce amounted to 2.8 million professionals, while the number... Read more
A spoofing vulnerability has been discovered in the way the Windows cryptographic library (crypt32.dll) validates certificates... Read more
We are thriving in a digital era when digital systems have become the backbone of our... Read more
In 2019, experts predicted that one business will fall prey to ransomware every 14 seconds. By... Read more
2019 is in the past already. Let’s share a summary around a few selected points. We... Read more