.
HomeSecurity

Security

The growing potential of behavioral biometric authentication

Behavioral biometrics has become an essential method of authenticating online users, yet its use...

Hacked! How to Mitigate the Impact of a Cybersecurity Incident

Discovering that your company has fallen victim to a cyber-attack can be a distressing...

The long and lingering death of passwords

Almost two decades ago, Bill Gates predicted the death of passwords during a talk...

Why passkeys are replacing passwords for digital sign-ins

Passwords have been around since the 1960s and represent the primary means by which...

Leveraging data analytics and machine learning to enhance IAM and data governance practices

In today's digital landscape, organizations are grappling with an unprecedented influx of data and...

The Benefits of Data Analytics in Compliance: Design, Effectiveness and Company Culture

Organisations are facing increasing expectations to proactively identify and mitigate financial crime, sanctions, and...

Translating the Risk Management into Business Language

The risk environment in which organisations operate has changed drastically in recent years, due...

Hot Topics