Ë

Security Features

As the world continues to focus on the ongoing effects of COVID-19 and plan for recovery, many have noticed a seismic shift in Canada’s privacy laws,

Read More

Read the 12 requirements of PCI DSS, what they entail, and how you can stay PCI compliant

Read More

The dismissal by a European Union court of a European-American personal data protection transfer agreement is making headlines in the United States.

Read More

In this mobile privacy guide, we look at why smartphone apps collect our private data, what they do with it, and the steps you can take to minimize the risks.

Read More

A recent cyberattack targeting famous figures is still being investigated. Twitter has confirmed that a total of 130 accounts were compromised.

Read More

The cloud holds enormous potential for business efficiency and innovation, it can also create a ‘wild west’ of broader environments to manage and secure.

Read More

The sensitivity of customer information and time-to-detection determine the financial blowback of cybersecurity breaches.

Read More

The question of the hour: How has IAM changed alongside the shift to remote work? Three panel speakers have answers.

Read More

Social engineering is a method used by attackers of using manipulation to obtain confidential info. Find out about this threat and how to defend against it.

Read More

How does facial recognition technology work, and how is it used today? We provide five real-world examples and list the pros and cons of these systems.

Read More