COVID-19 Spawns Security Concerns For Rapidly Expanding, Under-Protected Workforce

Worldwide, social distancing has affected the day-to-day activities of nearly every person. In many...

How to Authenticate Remote Workers in a Zero Trust Security Model

Where and how employees work has changed drastically in the last decade. Workers used to only be...

How to Strengthen Remote Workforce Security During Crises

The coronavirus health crisis has forced millions of workers (who are able) to transition to...

The Ultimate Guide to Passwordless Authentication

You have business accounts, therefore you have usernames and passwords...for now.

Analyzing API Security in the Multicloud World

Modern applications send and receive an unfathomable amount of data at any given time. This flow of...

Process Data Portability Requests: What Businesses Need to Know

Ever been fed up with your cell phone provider? Maybe you had a good deal the first few months,...

Challenges of Multicloud Solution Management and Security

Not all clouds are created equal, at least not in terms of security.

Blockchain to Biometrics: 2019’s Cybersecurity Trends

The 2020 editions to G2’s annual Digital Transformation Trends are in the works. In the past, I’ve...

Top Takeaways from My First IAPP Conference

I have been following the International Association of Privacy Professionals (IAPP) on social media...