.
HomeSecurity

Security

A Canadian Perspective on Digital Identity

Like many countries around the world rapidly embracing the digital frontier, Canada is ready...

Rethinking GRC for Modern Software Development

Governance, risk, and compliance (GRC) has become a standard practice for managing organizational risk,...

Removing the Murky NFT Mask

Even though human beings went on to become the smartest species in the world’s...

Cybersecurity Gets Physical

No matter what business you are in, it’s almost surely conducted inside of four...

Blockchain as a Framework for Trust

The last big technology wave was Artificial Intelligence, which started a decade ago and...

Why Do IT Risk Assessments Fail?

Every day we are faced with choices. Do I get up and go to...

Why Penetration Testing Is Increasingly Relevant Today

Think about this for a moment -- global CEOs rank cyber risk as a...

Laying the Pathway to a Healthier Climate

Humans aren’t wrong to take pride in their versatility, but at the same time,...

Using the Blockchain to Create Provable Process Audit Trails

Like the one designed by Accumulate, Blockchain systems can be created around permissioned identities...

Hot Topics