- Select Year
- 2024
- 2023
- 2022
- 2021
- 2020
- 2019
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013
- 2012
- 2011
- 2010
- 2009
![](/sites/default/files/default_images/matrix.jpg)
October is Cybersecurity Awareness Month and while IT departments around the globe don’t need a reminder to keep data safe and secure, this is an excellent opportunity to…
Read More![](/sites/default/files/default_images/matrix.jpg)
Digital criminals won’t stop targeting the Middle East. I’ve seen numerous attack campaigns targeting this region come to the surface in 2019 alone. Back in April, I remember …
Read More![](/sites/default/files/default_images/matrix.jpg)
I love the Go programming language. It’s easy to use, concise and powerful. These characteristics appeal to the typical programmer’s mindset. Yet, the brevity of the…
Read More![](/sites/default/files/default_images/matrix.jpg)
Public key infrastructure (PKI) requires key distribution and has been long criticised for its usability issues [13,14,15]. In an experiment [15] conducted for analysing the…
Read More![](/sites/default/files/default_images/matrix.jpg)
Business is booming and data is flowing. Retailers and shoppers are leveraging and enjoying many benefits data sharing brings: loyalty programs, personalized experiences,…
Read More![](/sites/default/files/default_images/matrix.jpg)
Data is the most valuable online currency a consumer possesses. Yet most people don’t trust the companies they’re sharing data with, according to a new market trends …
Read More