Cyber Security


Top Stories


woman engineer looking at various information in screen of futuristic interface.

Every Business Is Becoming A Technology Business

10-Dec-2018 | Manju Bansal

From the small, agile startup to the long-established enterprise, no business will be immune from digital transformation's imperatives.

Strong Customer Authentication (SCA) For PSD2

6-Dec-2018 | William Dudley

PSD2 SCA is a complex set of regulations, but it can be implemented to meet today’s authentication challenges and options and protect all parties involved.

IoT, bees, communication

The Social Behavior Of Honeybees Applied To IoT Systems

5-Dec-2018 | John Candish and William Dudley

Interconnected IoT sensors in a smart city are like a honeybee colony, a community with many individual sensors intercommunicating through various protocols.

Latest Stories

flash feature image Digitalist Flash Briefing: Turning Digital Uncertainty Into Competitive Advantage (Part 2)
Learn More

Can You Keep a (Data) Secret?
Learn More

Security Cred, Saving Face(s), Deep Fakeout
Learn More

leadership, governance, cybersecurity, digital strategy, board of directors, compliance How Do You Make Digital Oversight Work In The Boardroom?
Learn More

flash feature image Digitalist Flash Briefing: Why HR Leaders Of Growing Companies Should Care About Data Management 
Learn More

flash feature image Digitalist Flash Briefing: Turning Digital Uncertainty Into Competitive Advantage (Part 1)
Learn More

flash feature image Digitalist Flash Briefing: Ten Ways Small And Midsize Companies Can Strengthen Information Security
Learn More

IT security, cloud security, data security, data protection Data Security Mistakes Most Businesses Don’t Realize They’re Making
Learn More

Load more stories
← Older posts