night city banner

Cybersecurity Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Let’s Get One Thing Straight: Passwords AREN’T the Best Authentication Method
Dirk Geeraerts
Let’s Get One Thing Straight: Passwords AREN’T the Best Authentication Method

The COVID-19 pandemic has taught organizations that having staff work from home comes with its benefits. It’s even likely that having a remote workforce could be more…

Read More
Guest Blog: 6 Key Considerations for IoT Security by Design
Chris Hickman
Guest Blog: 6 Key Considerations for IoT Security by Design

It’s no secret that Internet-connected devices need security to protect data – and the device itself – from compromise. However, in many cases, IoT products are not engineered…

Read More
Are your Secrets Showing? Ensuring You Can Trust Your Code; A Code Signing Customer Use Case
Jennifer Dean
Are your Secrets Showing? Ensuring You Can Trust Your Code; A Code Signing Customer Use Case

A critical security control, code signing helps businesses and end users know their software can be trusted. Code signing guarantees the code of a program or software download…

Read More
blog
Brent Hansen
Federal Government is Excelling at Digital Transformation While Security Challenges Gain Ground

As the U.S. federal government contends with a tidal wave of demands in the COVID-19 battle, agencies are pushed to unprecedented limits. Some good news: the U.S. government is…

Read More
Navigating the New Normal: Data Security is Squarely in the Hands of the C-Suite
Tina Stewart
Navigating the New Normal: Data Security is Squarely in the Hands of the C-Suite

The drastic changes we’re experiencing in our personal and professional lives would have been impossible to imagine just a year ago when we shared this…

Read More
Maintaining Data Security Integrity and Trust Infrastructure with Remote IT
Charles Goldberg
Maintaining Data Security Integrity and Trust Infrastructure with Remote IT

Companies of all sizes, from the largest public enterprise to the smallest private firm, are all susceptible to cyberattacks. Having a presence on the Internet opens us up to…

Read More