night city banner

Cybersecurity Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
What is the most efficient way to deploy MFA
Holger Brückner
What is the most efficient way to implement MFA to end-users?

MFA implementation is still a problem for many companies Market analysts have made the disturbing statement that many companies have still not deployed MFA broadly. A…

Read More
A reasoned approach to managing digital sovereignty
Krishna Ksheerabdhi
A reasoned approach to managing digital sovereignty

The cloud is getting bigger and more complex to manage by the minute. According to the global edition of…

Read More
Top Five Reasons for Choosing FIDO2 Devices for Enterprise Authentication
Danna Bethlehem
Top Five Reasons for Choosing FIDO2 Devices for Enterprise Authentication

Strong yet convenient authentication has become a paramount factor of a robust security posture for modern, digital, cloud-first enterprises. The increased adoption of multiple…

Read More
Payment Security Vulnerabilities - Change is Everywhere Thumbnail
Simon Keates
Payment Security Vulnerabilities: Change is Everywhere

It has always been understood that change is inevitable.  Many clichés surround the concept of change, including being changed for good, and change that you cannot stop.…

Read More
Financial services continue to lead in cybersecurity
Marcelo Delima
Financial services continue to lead in cybersecurity preparedness, but chinks appear in the armor

Organizations in the finance sector manage trillions of dollars and maintain very valuable and vital electronic data, including bank account, credit card, and transaction…

Read More
The value of Key Rotation and Re-encryption
Mark Warner
The value of Key Rotation and Re-encryption

To meet various compliance requirements and reduce the risk of your most sensitive data getting compromised you may want to consider changing the encryption key used to protect…

Read More