We had a great year talking with experts on a range of security topics, so who better to turn to for prognostications for the new year? Here’s a collection of predictions from some of our guests...
The practice of using different passwords for the hundreds or thousands of online locations we visit has grown quite out of control and long ago fell short of being a practical or secure process...
The data about ourselves is willingly submitted to organizations every time we make a purchase, open an account, or simply move around, online and in-person. Where does it go? Who owns it? What ...
The concepts behind Diversity, Equity, and Inclusion have been practiced by some organizations in the past, but in this new era where the border lines between work and life are becoming increasi...
Is there such a thing as a quantum computing cryptopocalypse? Will we see the end of current security practices within the next few years, and what does this mean for the data that organizations...
Cloud continues to evolve, but so too do the human organizations that depend on it. Companies expand into new territories, they buy other companies, or get bought, and the vendors with whom they...
When you are a hammer, everything looks like a nail. Cybercriminals continue to succeed in discovering flaws and weaknesses in every connected technology. From zero days to SQL injection, what m...
Companies and cloud providers around the world are tackling the thorny issue of digital sovereignty, seeking to protect their customer’s data as it travels across physical borders, while simulta...
Over the past few years, the definition of the chief information security officer (CISO) has changed as business environments have evolved. With digital transformation, cloud and hybrid working ...
Today, data breaches are so endemic that it could be argued that consumers are becoming numb to the effects – they change their passwords, get a few reassuring emails from the company and more o...