Identity Security

Voice Cloning Technology – A Review
Identity & Access Management Voice Cloning Technology – A Review

Imagine a world where the soothing or authoritative voice you hear on the other end of the line isn’t human but a digitally reconstructed clone of a real person. This scenario, once confined to speculative fiction, is now a critical aspect of today's reality thanks to voice cloning technology. The

How Does Coinbase Combat Cyber Threats Without Paying Ransom?
Identity & Access Management How Does Coinbase Combat Cyber Threats Without Paying Ransom?

In today's digital age, the rise of cryptocurrency has simultaneously paved the way for a new wave of complex cyber threats. These threats often target both financial institutions and their customers, aiming to exploit vulnerabilities for financial gain. Recently, Coinbase, a leading cryptocurrency

Are Passkeys the Future of Passwordless Authentication?
Identity & Access Management Are Passkeys the Future of Passwordless Authentication?

Rupert Marais is renowned for his expertise in security strategy, specializing in endpoint and device protection, cybersecurity frameworks, and network management. His insights are invaluable for understanding today's complex security landscape. In this interview, we'll explore various aspects of

NY's Cybersecurity Rule: Revolutionizing Finance Firms' Safety
Identity & Access Management NY's Cybersecurity Rule: Revolutionizing Finance Firms' Safety

New York's cybersecurity regulations, encapsulated in 23 NYCRR Part 500 and enforced by the New York Department of Financial Services (NYDFS), have ushered in a new era of safety standards for finance firms. These regulations underscore a crucial shift toward heightened cybersecurity protocols

How Is Malwarebytes Tackling the Surge in Cybercrime?
Infrastructure & Network Security How Is Malwarebytes Tackling the Surge in Cybercrime?

Rupert Marais, an in-house Security Specialist, brings a wealth of knowledge in endpoint and device security, cybersecurity strategies, and network management. In our discussion, he sheds light on how Malwarebytes is tackling online fraud and enhancing cybersecurity for organizations worldwide

CISOs Highlight Emerging c Scams and Impersonation Threats
Identity & Access Management CISOs Highlight Emerging c Scams and Impersonation Threats

The modern era of digitalization has brought about significant advancements in cybersecurity. However, with these advancements come equally sophisticated cyber threats. Chief information security officers (CISOs) are particularly concerned about the rapid evolution of phishing scams and

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later