.
HomeSecurity

Security

APIs in four facts: A summary for CXOs

Application Programming Interfaces (APIs) pretty much run the internet. In 2017, it was estimated...

Left Behind: The Unrealized Promise of Shift Left in Application Security

Not long ago, the term "shift left" entered the lexicon of application security. A...

The criticality of collaboration between AppSec and Engineering teams to ensure success

Application security programs are vital to ensuring that every organization reduces the risk associated...

Realizing the transformational potential of digital wallets depends on assurance

Societal adoption of digital wallets can revolutionize the global economy by transforming how customers...

How to win the race with hackers when new vulnerabilities are publicly disclosed!

Keeping deployed web applications up-to-date is imperative to prevent data breaches. It’s an existential...

How Identity Governance compliments MFA in protecting your data

The benefits of well implemented multi-factor authentication (MFA) are apparent when it comes to...

Data Breach – the regulatory landscape in the UK and Europe

Data breach is a ubiquitous threat for all organisation and exists regardless of their...

Data Protection is now a staple in our Digital Society

Data loss prevention (DLP) is a critical aspect of protecting a business from costly...

A Fresh Look at Business Continuity & Recovery Planning

We have all received those emails from someone in a foreign country that has...

Hot Topics