Blog
By Sandertemme
Organizations are putting more sensitive data in the cloud. According to the 2020 Global Encryption Trends Study conducted by the Ponemon Institute and sponsored by nCipher Security and Entrust Datacard. Fifty-eight percent of the 6,457 respondents, across multiple industry sectors in 17 countries, More sensitive data in the cloud Organizations
By Angel Fernandez
While 5G has been a conversation piece for many years, it is now quickly shaping up to be a global reality. Recently, Verizon expanded its 5G Ultra Wideband service into more cities across the United States. Samsung has also started announced its lineup of 5G devices, the Galaxy A51 5G
By David Balaban
Sometimes, we tend to scold different devices, calling them stupid, when we cannot cope with them and they do something “wrong” or not what we expect. The topic that has to do with various problems awaiting us if artificial intelligence gains unconditional superiority over humans cannot but capture the imagination
By AJ Yawn
It is almost impossible to monitor a cybersecurity news cycle without reading about another organization experiencing a breach caused by an exploited third-party vendor vulnerability. For example, 1 million of healthcare provider Kaiser Permanente’s health records were exposed by one of its business associates – a California-based record storage firm.
By Jack Gold
Learn about the different mobile security models that organizations can choose from and how vendors combine cloud-based threat defense with on-device security. Organizations have become increasingly reliant on mobile security vendors to protect devices, and there are several types of mobile security approaches that can help them optimize their mobile