Editorial

5 Strategies for Balancing Security, Acquisition, and Support Costs Without Sacrificing CX
Editorial 5 Strategies for Balancing Security, Acquisition, and Support Costs Without Sacrificing CX

Since its inception, the global pandemic has continued to have a long-lasting impact on how we buy, work, and also how our businesses operate. As such, user behaviour has naturally evolved, leading to developments in customer experience (CX) to meet the changing needs and expectations brought about

U2F Security Key Explained: How It Works & Why You Need It
Editorial U2F Security Key Explained: How It Works & Why You Need It

As we are increasingly vulnerable to online crime, a strong password used for a website is no longer considered a sufficient security measure, especially for those handling sensitive data. Even if we use special characters and upper and lower case in the account creation process, we can’t be sure

The Secure USB Stick—The Little Wizard of Strong Security Practices
Editorial The Secure USB Stick—The Little Wizard of Strong Security Practices

Nowadays, implementing strong security practices is more important than ever because offices are no longer stable physical locations, while the diversity of access points in organizations’ ecosystems are constantly growing. Managers are facing these challenges for the first time, and they are

Social Engineering—From the Trojan Horse to Friendly Emails: Exploiting the Most Common Human Characteristics
Editorial Social Engineering—From the Trojan Horse to Friendly Emails: Exploiting the Most Common Human Characteristics

Organizations view information as a strategic resource, and the importance of integrating applications and IT systems are becoming increasingly important. So, in recent years—as a result of accelerated digitization—the list of risks and types of cyberattacks has grown. Furthermore, emails

Understanding Homomorphic Encryption: A Crucial Technology for Securing Data in Cloud Computing
Editorial Understanding Homomorphic Encryption: A Crucial Technology for Securing Data in Cloud Computing

A few years ago, talking about homomorphic encryption in a business context would elicit either blank stares or sighs. Those who were familiar with it recognized its paradigm-shifting potential, and others were just curious about its potential and its computational practicality. But now, the world

Are We Still Using Firewalls In 2022?
Editorial Are We Still Using Firewalls In 2022?

Designed to protect computer networks against unauthorized access, firewalls have been an enterprise battleground for many years. The firewall may be implemented as a form of hardware, software, or a combination of the two. After the “classic” firewall market became somewhat saturated, developers

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later