Access Governance Strategy – Next Level Enterprise Cybersecurity
A good identity and access management requires a good access governance strategy.
Read moreA good identity and access management requires a good access governance strategy.
Read moreThe new standard EN 303 645 deals with the issue of security in connected devices. Alex Leadbeater, Chair of ETSI Technical Committee CYBER, describes the motivation and benefit of this new standard in this article.
Read moreIn cybersecurity, the brutal reality is that security incidents happen every day, but the impact of most are negligible. The real challenge is spotting which events are most likely to inflict the most damage to the business. Read how in our latest article.
Read moreEvery once in a while we publish topics which are of general interest, such as this article from SpecOps Software, who interviewed Environmental Psychologist Lee Chambers about online bullying and what you can do to protect your children.
Read moreContinuiing his series on OSINT, our guest author Dr. Varin Khera gives an introduction to digital forensics – an important skill to have now and in the future.
Read moreRisks are usually seen as something negative, while the word itself is actually neutral. Follow our author Tom Madsen in his eploration of the positive aspects of risks in cybersecurity.
Read moreThis week, Russia approved the first vaccine against Covid-19. A few weeks earlier, the US and the UK announced a cyber attack from Russia was trying to steal Covid-19 related research. We spoke with Prof. Panos Yannakogeorgos from NYU about the geopolitical aspects of cybersecurity
Read moreChatbots are the latest hype. However, those bots are often unsecured and the potential for mischief is big. Watch our interview with Chad Hiremath to learn about the security of chatbots.
Read moreWe spoke with Matt Donato about the challenges of finding the right experts in Cybersecurity as well as the opportunities for security experts in a dynamic environment
Read moreThe CJEU’s decision on Schrems II declared Privacy Shield invalid. The implications cannot be foreseen, but it is clearly a win for data privacy. Read what experts say on the ruling.
Read more