Fingerprint biometrics finally makes its way onto cards


As a consequence of the COVID-19 pandemic, consumer interest in contactless payments has been boosted by a general aversion to touching shared surfaces. Although the security of EMV cards is high thanks to their E2E…

Confidential Computing: data security in data processing


In recent years, there has been concern about protecting data or workloads during their storage in the cloud or movement across the network, but what about during their processing? Data must be protected while it is…

What can we expect from Cybersecurity in 2021?


2020 has been a year that all people, everywhere in the world, will remember forever, and not just as a good year, but as a year in which all aspects of our lives have been affected by the worst public health crisis in…

By 2020, the level of cyber security threats has increased


Many companies have been making a clear commitment to protecting themselves against cyber-threats for some time now. Trust and investment in cybersecurity is on the rise, and the COVID-19 pandemic has only accelerated…

The new reality is revolutionising cyber security


Many companies have been making a clear commitment to protecting themselves against cyber-threats for some time now. Trust and investment in cybersecurity is growing, and the COVID-19 pandemic has only accelerated this…

COVID-19 and its impact on Cybersecurity


The COVID-19 pandemic has brought an immense humanitarian crisis that has also severely affected the world economy. The rapid and unexpected interruption of all activity for companies around the world has left them…

Cybersecurity is indispensable in remote work


Telework is a concept that has been around for years, yet the recent Covid-19 pandemic has increased the number of teleworkers to unprecedented levels worldwide. Many governments and companies are adopting social…

Does the role of ‘Virtual CISO’ make sense?


With constant reports of cyber attacks in the media, most small and medium-sized organizations have become aware of the reality of cyber threats in recent years. As cyber security becomes a threat to businesses,…

IDaaS The best solution for user management?


The exponential growth of the Cloud, and in particular the rise of Software-as-a-Service (SaaS) applications, has changed the way companies do business. Deploying SaaS via the Cloud means lower maintenance costs,…

SDP model supersedes VPN solutions


The Internet of Things (IoT) remains a relatively young technological innovation, although the concept of "communicating devices" is a well-established and accepted paradigm in virtually all industries. In fact,…