Guest Contributor


By Rashed Abdel-Tawab, Lead Product Manager, CIS Mobile When Apple recently announced several new features aimed at curbing the distribution of child sexual abuse material (CSAM), the backlash was predictable. Security experts and privacy advocates alike immediately criticized the technology, which enables Apple to scan photos stored in iCloud for […]

Smartphones Putting Government Users at Risk


By John Callahan, Chief Technology Officer, Veridium The 2020 pandemic and resulting work-from-home experience yielded an important conclusion regarding cybersecurity: identity is the new perimeter. Sixty-three percent of all data breaches exploit weak credentials, and incidents like SolarWinds highlight the need to focus cybersecurity on identity and access management (IAM) […]

One Size Doesn’t Fit All – Auth Journeys to Digital ...




By Reef Pearson, SecureTeam Headlines throughout the pandemic have been fixated on panic-evoking cyberattack figures, the security ‘ignorances’ of staff working from home, and the critical shortage of jobs in the Cybersecurity industry. Yet despite every cyber disaster being the result of a failed prevention, there hasn’t been any noise […]

Is the COVID-19 Cybersecurity Crisis a Perfect Example of How ...


By Amanda Lieu, Product Marketing Manager, SEON The internet could never be just one thing. Does it allow for previously unheard-of levels of privacy, allowing anyone from political dissidents to criminals to organize anonymously? Of course. Does it also record everything we are doing, a true panopticon that is watching […]

The reality of online fraud means balancing privacy and security


By Dr. William Bain, CEO and Founder, ScaleOut Software The rapidly evolving cyber-physical landscape of large organizations paired with the ongoing COVID-19 pandemic have dramatically increased the need for more responsive and agile security and safety systems. How can organizations gather fast insights and respond in the most intelligent, effective […]

Real-Time Digital Twins: New Technology for Security and Safety in ...



By Emily Newton, Editor-in-Chief of Revolutionized Magazine How data is stored has become an important consideration for businesses. Most companies have the option of choosing between on-site, local storage and off-site solutions like the cloud. Both options have advantages and disadvantages, and neither is necessarily the right choice in every situation. […]

Should Your Business Choose On-Site or Off-Site Servers?



By Rob Shavell, Co-Founder and CEO of Abine/DeleteMe The reality that governments, even democratically elected ones, abuse their citizens’ privacy is unsurprising. However, as the recent Pegasus scandal reveals, the way privacy is infringed upon by authorities who purport to protect it has entered a terrifying new era.  Developed by […]

The Government’s New Outsourced Surveillance Machine





By Mark Bole, CEO, Quortus Connectivity solutions for many enterprises must meet a number of requirements: robustness, resilience, and consistency. More recently and increasingly so, another important element has been added to this list: infallible security. With regular news of hacks, breaches, and other kinds of cyber-attacks, existing connectivity provision […]

Private Network Solutions – The Answer to Failsafe Security?