Editorial

How to Choose the Right Unified Endpoint Management Solution
Editorial How to Choose the Right Unified Endpoint Management Solution

Today, many businesses use a large number of connected devices, ranging from desktop computers to barcode scanners. As IT and security leaders work around the clock to secure and maintain servers, computers, smartphones, tablets, iPads, IoT devices, virtual machines, and more, choosing the right

The Security Gaps of Deepfakes
Editorial The Security Gaps of Deepfakes

A year ago, Jordan Peele made a video warning us of the impending spike in deepfake technology. In that video, Peele uses machine learning technology to ventriloquize Obama and appear as if Obama is saying outlandish statements. Even if such videos appear as amusing, the implications that deepfake

Cyberattacks During COVID-19 Crisis—Are Hospitals Secure?
Editorial Cyberattacks During COVID-19 Crisis—Are Hospitals Secure?

The healthcare sector has witnessed a 150% increase in cyberattacks since the beginning of the year. With medical staff already overburdened and overworked by the demands brought on by COVID-19, healthcare organizations could be the perfect targets for various attacks. Discover the most significant

The Digital Cold War: What to Expect in 2020
Editorial The Digital Cold War: What to Expect in 2020

Is your business prepared to face the new cyber cold war threat? This is becoming an increasingly pressing concern for many European and US businesses, as the reality of a digital cold war between the west and the east becomes clearer and clearer each day. For many, what lies ahead is a big

Security Measures & Compliance Practices for eSignatures
Editorial Security Measures & Compliance Practices for eSignatures

Electronic signatures are becoming increasingly popular in the modern era since more and more companies have started to notice their multiple benefits. Speed, one of the key advantages of this solution, is what often drives people’s interest in using digital signatures. However, in today’s evolving

5G Security Concerns for 2020 and Beyond
Editorial 5G Security Concerns for 2020 and Beyond

A new decade fresh with opportunity is upon us, along with new opportunities for cybercriminals to prove their skills.  Cybersecurity threats have become increasingly ingenious over the last couple of years. To think that it all started out as “phone phreaking” in the late 1960s and early 1970

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later