What does 2025 have in store for us? If it is anything like 2024, it will be interesting times indeed. In this episode, host Steve Prentice has a virtual fireside chat with David Holmes, CTO for...
Data sovereignty has three dimensions: data residency, access to data, and stewardship of data. Besides deciding where to store data, it is essential to determine who can have access to it - whi...
The quantum computing revolution is almost upon us, and this means a new world of cryptography, cybersecurity and, of course, cybercrime. Not all of us are aware of the magnitude of the change t...
Passkeys are a groundbreaking technology that leaves traditional passwords in the dust. They are designed to be resistant to phishing attacks thanks to their relationship to specific websites or...
Cloud technology may be efficient and vital to the global economy, but it comes at a substantial cost in terms of the power to make it run. This will only increase as more sophisticated forms of...
Information and communication technology (ICT) risk management is a vital part of daily practice for organizations in any industry. For those in the EU financial sector, a new set of regulations...
In discussing the recent acquisition of Imperva into the Thales fold, Nanhi Singh, VP Application Security and Customer Success at Imperva, and Todd Moore, Global Head of Data Security Products ...
Guests: James Leaton Gray, Director at The Privacy Practice, a firm that specializes in privacy and data protection and Haider Iqbal Manager of Product Marketing for Thales Identity and Access M...
We had a great year talking with experts on a range of security topics, so who better to turn to for prognostications for the new year? Here’s a collection of predictions from some of our guests...
The practice of using different passwords for the hundreds or thousands of online locations we visit has grown quite out of control and long ago fell short of being a practical or secure process...