Guest Contributor


By Mohit Malik As technology advances and data storage capacities increase, the use of solid-state drives (SSDs) has become more prevalent. The speed and performance of SSDs make them ideal for the storage of sensitive information, such as financial data, personal information, and confidential business documents. However, when it comes […]

Your Guide to Safe and Secure SSD Disposal: Avoiding Data ...


By Frank von Seth, CEO, cyan digital security Cyber Security is becoming increasingly important in the automotive industry. Developments such as networking, connectivity, and autonomous driving continue to drive digitization in the automotive industry. The challenge is that a higher degree of digitalization also opens up gateways for hackers. However, […]

Cyber Security and Its Importance for the Future of the ...




By Roger Northrop, Chief Technology Officer at Mutare Voice phishing (“vishing”) has emerged as a new and increasingly concerning security vulnerability for businesses. The tactic involves a criminal agent or agents posing as a trusted source in order to trick their victims into divulging passwords or other protected information over […]

Watch out! 5 Reasons Vishing is on the Rise – ...


By Brett Beranek, Vice President & General Manager, Security & Biometrics, Nuance Communications When disruption strikes, fraudsters are incredibly fast to shift their tactics and exploit new vulnerabilities.  During the COVID-19 pandemic, for example, we clearly saw the agility and opportunism of fraudsters as they preyed on consumers’ fear and […]

How Multimodal Biometrics Help Banks and Retailers Fight Fraud During ...


By: Gordon Cooper, Director of Customer Solutions at Ardoq There’s often an allotted margin of error when it comes to business strategy or finance. Mistakes are built into the plan and are, to an extent, an accepted part of the process.  However, the rules couldn’t be more different for enterprise […]

Architecting the Enterprise for Cybersecurity: Visibility-Focused, Data-Backed, and Streamlined



By Pawneet Abramowski Trade/ Economic sanctions are a powerful tool. The rules and regulations dictated by governments for various reasons can majorly impact national economies and affect businesses of all sizes. The war in Ukraine unsurprisingly prompted the President, the US. Treasury department and other nations to increase sanctions against […]

Regulations, Risks and Reputation: The 3Rs to Consider How Sanctions ...



By Kaushal Saraf, Lead Engineer at Atomus Microsoft Azure Active Directory (AD) provides businesses with a cloud-based identity and access management service for safeguarding their resources, applications and services from unauthorized access. As such, it is an integral part of any organization’s security infrastructure. This post will discuss two simple but […]

2 Ways To Create a Robust Security Baseline Using Microsoft ...



By Emily Newton, Editor-in-Chief at Revolutionized Magazine Ensuring data center security is a complex but necessary undertaking. Reliable cybersecurity means accounting for all relevant threats. Malware and social engineering typically take up most people’s focus as they’re among the most common, but distributed denial of service (DDoS) attack prevention deserves attention, […]

Can Your Data Center Safeguards Stop a DDoS Attack In ...



By Hila Meller, Managing Director Global Security Sales, BT Group With unprecedented need for scale, flexibility, and access to data and applications, organizations are turning toward cloud to remain competitive in a rapidly changing business environment. According to IT company Flexera’s annual “State of the Cloud” report, 59 percent of […]

Three Critical Steps to Secure Your Move to the Cloud