Guest Contributor


By Alan Cunningham The United States’ communications sector faces a variety of threats from multiple different actors, including foreign intelligence entities, organized criminal groups, and terrorist organizations, and methods, such as physical infiltration and the gaining of sensitive data and the electronic hacking into databases to access information or shut […]

The Power to Manipulate and Deceive: Social Media as the ...


By Rick Bentley, CEO, Cloudastructure Want to see an industry that is a good example of where video surveillance security is headed? Look no further than the cannabis industry. Most states require cannabis businesses to record activity in every area of their enterprise with clear images showing customer and employee activity, plus cash […]

Post-Pandemic Intelligence: Why More Enterprises Are Embracing Cloud-Based Security


By Marcin Szary, CTO and co-founder, Secfense American Login.gov service, the UK National Health Services Login application, the Czech DNS registry, the Swedish educational system eduID. These are just a few of many government applications from around the world, whose security is now protected by Multi-Factor Authentication (MFA). More and […]

Will Multi-Factor Authentication Protect Countries from Cybercriminals?




By Glenn Murray, CEO at Sapien Cyber Infection is spreading rapidly, and systems are failing. Identifying where the virus has started, how the virus infects others, tracking its movements, and containing the infection need to be done as quickly as possible to minimize impact. Compounding the seriousness of the situation […]

What the Pandemic Can Teach Us About Our Response to ...





With cybercrime attacks rising steeply in recent months, revisiting and revising your company’s security strategy is essential By Tim Grieveson, CISO, AVEVA Global cyber breaches have reached record levels in recent months. As the pandemic subsides, new hybrid working models are here to stay – along with a globally widened attack […]

How to Protect Industrial Security in the Age of Hybrid ...


By Joe Breaux, CTO, TRUCE Software Businesses are forever pressed with ensuring they are rigorously protecting their most important assets: Their people, their customers (or in the case of healthcare, for example, their patients), and their data. There’s a tremendous amount at stake when any of these become compromised. Even […]

Safeguarding an Organization’s Most Valuable Assets with Smarter Workforce Mobility



A recent GroupSolver study reveals concern among digital consumers about their personal information being collected and sold, and nearly half are willing to pay platforms to keep their data private.  Rasto Ivanic, Co-founder and CEO of GroupSolver® Every day, users’ online interactions are monitored and stored by technology companies to […]

Selling Privacy Protection Could Be a Win-Win for Big Tech ...


By Julian Lovelock, Vice President, Global Business Segment Identity and Access Management Solutions, HID Global Even before the pandemic changed so much of daily life in so many ways, there was a transformation in workplaces. Physical boundaries were no longer the only perimeter defining secure workplace access. Identity became a […]

Protecting a New Perimeter