How a medieval city can explain cloud security.
There are two kinds of cloud security, and both can be explained using the analogy of a medieval city or village. Let’s do the time warp (again).
Read more...There are two kinds of cloud security, and both can be explained using the analogy of a medieval city or village. Let’s do the time warp (again).
Read more...When we speak about Cybersecurity, we are mostly discussing software. What about hardware? We’ve discussed this with Bentsi Ben-atar, CMO and Co-Founder for Sepio Systems in our latest Video Byte.
Read more...Keeping the best talent will always be an uphill battle. From trying to entice teachers to forgo higher pay to motivating well-paid employees to achieve more and elevate the corporate vision, nearly endless factors shape the equation of: will they stay or will they go?
Read more...Bruce Schneier has an opinon on blockchain
Read more...Cyber threat intelligence is a vital strategy that prevents attacks, and web scraping is critical to its success.
Read more...The NIST announcements about 4 algorithm standards to protect against quantum computing hacks had marketing departments go into overdrive. We decided it’s time to start demystifying quantum cryptography.
Read more...Last month, it was reported that Roblox – an online game creation platform – had suffered a data breach aftermore
Read more...29th July is SysAdmin Day, designed to remind everyone of the hard work that SysAdmins do behind the scenes. Cyber Protection Magazine spoke to ten technology experts to hear why SysAdmins are so important, and how we can all better show our appreciation.
Read more...The announcements in the past few weeks from Apple, Google and other major consumer companies about transitioning out of themore
Read more...Personal identity information (PII) is more vulnerable than ever, so securing it becomes more important. CPM gives an overview of current and future solutions.
Read more...