How Blockchain Makes IoT More Secure
Author: Myrtle Anne, Founder of Block Tides IoT technology is increasingly connecting multiple devices to the internet. Along with the high connectivity and diversity of... Read More
Why Organizations Need Strong Cybersecurity Risk Management Capabilities
Author: Malini Rao, Global Head-Cybersecurity & GRC Operation, Medtronic With the increase in usage of network and cloud technology, and growth of remote employment, organizations... Read More
What Are Forks and Coordination in Blockchain?
Author: Neo C.K. Yiu, Lead Blockchain Architect at De Beers Group. Blockchain is a continuously developing technology that has made digital transactions and related computing... Read More
What Is Keystroke Logging and How to Defend Against It?
Author: Carina Birarda, Leader of Special Cybersecurity Projects, GCBA Cybersecurity Center. Cyber criminals are ramping up their efforts for intrusion in line with developments in... Read More
Rise of Network Security in a Decade
Author: Guncha Malik, Compliance Leader, IBM The advent and evolution of the internet has invited the growth of various unwarranted threats and unforeseen attacks. Network... Read More
5G: The Next Level of Connectivity
Author: Dr. Teju Oyewole, Head of Information Security, Mortgage & Loan company Wireless technology has leaped to the next generation — 5G. A rapid, immense,... Read More
How to Protect Your IoT from Cyberattacks
Author: Mohamed (Mody) Mohamed, Information Security Architect, Collegeboard Internet of Things (IoT) technology plays an important role in our current modern society by helping us... Read More
How to Conduct App Security Testing for Smartphones
Author: Brian Curnutt, Vice President of Partner Development, The Crancer Group Smartphones and smart devices are being incorporated into both the personal and business life... Read More
Computer Forensics in Today’s World: Trends & Challenges
Author: Catello Buonocore, CEO & Senior Software Developer, Accademia The constant development in the advancement of Information Communication & Technology (ICT) has led the entire... Read More
Application Security Testing: A Guide to SAST and DAST
Author: Vanessa Padua, Cybersecurity Executive – Director, Microsoft Application security is defined as the process of making web and mobile-based applications secure and impervious to... Read More