5 min read
What is an Assurance Protocol in Mobile App Security?
Mobile apps and mobile software components are rarely stand-alone as they frequently perform their most important operations on various backend...
5 min read
Mobile apps and mobile software components are rarely stand-alone as they frequently perform their most important operations on various backend...
4 min read
Large-scale quantum computing is coming soon, and with that comes new cybersecurity threats. One of these threats is "steal now, decrypt later,"...
3 min read
It is not a question of if, but when quantum computing will arrive and be used for malicious purposes, as the expectation is that this new technology...
2 min read
Hardware security modules (HSMs) are physical devices that provide cryptographic functions such as encryption/decryption and digital signing. They...
5 min read
Each year, various events within the cybersecurity industry have a significant impact on the industry, leading experts to predict an increase in the...
2 min read
With post-quantum technology having the potential to trigger a new wave of cyber threats, we identify 10 steps that organizations should take to...
4 min read
The UK's relationship with the EU has been tumultuous in recent years, especially in the wake of Brexit. With regards to digital identities, former...
2 min read
Cloud computing brings many benefits to enterprise businesses; easily scalable, cost-effective and resilient, cloud computing enables rapid...
4 min read
EMV Personalization of a payment card is the process of writing data to the card in order to make it ready for use. This includes loading the card...