night city banner

Cybersecurity Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Is the demise of OTP authentication imminent
Chris Martin
Is the demise of OTP authentication imminent?

Digital transformation and the increasing reliance on remote business continue to accelerate the adoption of new …

Read More
One Year Later: What Have We Learned Since the Colonial Pipeline Attack
Todd Moore
One Year Later: What Have We Learned Since the Colonial Pipeline Attack

It is hard to believe that it has already been one year since the…

Read More
Key Repatriation, the first step in re-establishing Cloud Data Digital Sovereignty
Brian Grant
Key Repatriation, the first step in re-establishing Cloud Data Digital Sovereignty

Repatriation is the process of returning an asset, an item of symbolic value, or a person—voluntarily or forcibly—to its owner or their place of origin or…

Read More
5 Lessons Star Wars Can Teach Us About Cybersecurity
Liz Kelly
5 Lessons Star Wars Can Teach Us About Cybersecurity

"A long time ago in a galaxy far, far away...." That was the opening crawl that marked the beginning of the epic Star Wars series that took the world by storm and…

Read More
Anatomy of a Quantum Attack
April Burghardt
Anatomy of a Quantum Attack

Next-generation cyberattacks are often summarized as ransomware, man-in-the-middle, brute-force, phishing, insider, or malware attacks. Each present a unique set of challenges…

Read More
How to protect healthcare and life-sciences data from a cyber attack pandemic
Marcelo Delima
How to protect healthcare and life-sciences data from a cyber attack pandemic

Once slow to adopt new technologies, healthcare-related industries have been rapidly embracing digitalization to enable patient-centric care that is more effective for patients…

Read More