User experience – a delicate balance?

Your customers already provide a lot of information you can use to understand who they are — you just might not be tracking it yet.
The post User experience – a delicate balance? appeared first on NuData Security.
The post User experience – a delicate … Continue reading User experience – a delicate balance?

Ransomware attacks: How to protect against real-life data hostage threats

Ransomware attacks: what they are and how to protect against them using a disaster recovery plan.
The post Ransomware attacks: How to protect against real-life data hostage threats appeared first on NuData Security.
The post Ransomware attacks: How to … Continue reading Ransomware attacks: How to protect against real-life data hostage threats

What is the digital identity?

As we continue living much of our lives online, we need to close the security gaps in our identity ecosystem. It starts with…
The post What is the digital identity? appeared first on NuData Security.
The post What is the digital identity? appeared fir… Continue reading What is the digital identity?

What is the digital identity?

As we continue living much of our lives online, we need to close the security gaps in our identity ecosystem. It starts with…
The post What is the digital identity? appeared first on NuData Security.
The post What is the digital identity? appeared fir… Continue reading What is the digital identity?

Mitigating sophisticated attacks — the NuData way (part II)

It’s getting harder to tell humans and robots apart. Mitigating sophisticated attacks is possible, but requires behavioral defenses. Read on.
The post Mitigating sophisticated attacks — the NuData way (part II) appeared first on NuData Security.
The po… Continue reading Mitigating sophisticated attacks — the NuData way (part II)