night city banner

Cybersecurity Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
EU Security and Privacy Laws: What to Expect in 2023 and Beyond
Dirk Geeraerts
EU Security and Privacy Laws: What to Expect in 2023 and beyond

In the modern era, it’s indisputable:…

Read More
Study: Software Vendors Needed A 3rd-Party Monetization Solution
Shimon Abouzaglo
Study: Software Vendors Needed A 3rd-Party Monetization Solution. Here’s Their Experience Using Thales’ Sentinel

This article references the commissioned Total Economic Impact™ (TEI) study conducted by Forrester Consulting on behalf of Thales.If you are a…

Read More
5 Ways CIAM Ensures a Seamless and Secure Customer Experience
Wouter de Wit
5 Ways CIAM Ensures a Seamless and Secure Customer Experience

In today's digital-first world, providing customers with trustworthy, hassle-free interactions is critical to business success. A CIAM solution serves as that ‘first door’…

Read More
Self-Sovereign Identities, The Next Step in Privacy-First User Experience
Jason Keenaghan
Self-Sovereign Identities, The Next Step in Privacy-First User Experience

There is a growing momentum around Self-Sovereign Identities (SSI) with real value to be captured by individuals, countries, and businesses. When privacy is at stake, SSI puts…

Read More
Respecting Privacy and Data Protection: World Consumer Rights Day
Ashvin Kamaraju
Respecting Privacy and Data Protection: World Consumer Rights Day

For the last four decades, March 15th has marked World Consumer Rights Day - a campaign to raise global awareness about the needs and rights of consumers. Driven by Consumers…

Read More
Key Points from the US National Cybersecurity Strategy 2023
Jillian Belles
Key Points from the US National Cybersecurity Strategy 2023

On March 2, the Biden administration released its 2023 National Cybersecurity Strategy, an attempt “…

Read More