Mitigating cybersecurity risks for employees working remotely

Many IT specialists are supporting fully remote teams for the first time ever, so it’s important for everyone to operate with the same caution (if not more) than they would if everybody was in an office. With an increased risk of employees falling prey… Continue reading Mitigating cybersecurity risks for employees working remotely

As companies rely on digital revenue, the need for web and mobile app security skyrockets

As non-essential businesses have been forced to shut their doors around the world, many companies that previously relied heavily on the brick-and-mortar side of the business are now leaning more on revenue from their digital platforms. By 2023, accordi… Continue reading As companies rely on digital revenue, the need for web and mobile app security skyrockets

Keeping your app’s secrets secret

The software development process has vastly changed in this past decade. Thanks to the relentless efforts of the cloud and virtualization technology providers, we now have nearly limitless compute and storage resources at our fingertips. One may think … Continue reading Keeping your app’s secrets secret

Is the future of information security and tech conferences virtual?

The COVID-19 pandemic has brought about many changes to our personal and work lives. Among the latter are the forced work from home shift and the inability to travel far and attend in-person meetings, industry-specific workshops, events and conventions… Continue reading Is the future of information security and tech conferences virtual?

Assessing the risks of ACH payments

Organizations today are tired of the inefficient processes, expensive fees and outdated methods involved in payment transfers. Modern business leaders want to move money in a more efficient, cost-effective way. For that reason, more companies are turni… Continue reading Assessing the risks of ACH payments

Cybersecurity pros share insights into their current work situations

In the (ISC)² COVID-19 Cybersecurity Pulse Survey, 81% of respondents, all responsible for securing their organizations’ digital assets, indicated that their job function has changed during the pandemic. 90% indicated they themselves are now working re… Continue reading Cybersecurity pros share insights into their current work situations

The battle against ransomware: Lessons from the front lines

Ransomware is arguably the most significant cybercrime innovation in recent history. The ransomware business model is so effective that it is now the most common and devastating threat to organizations of all sizes. As a provider of cyber insurance, we… Continue reading The battle against ransomware: Lessons from the front lines

The state of data quality: Too much, too wild and too skewed

We live in the age of data. We are constantly producing it, analyzing it, figuring out how to store and protect it, and, hopefully, using it to refine business practices and better understand the markets and customer we work with. However, this is all … Continue reading The state of data quality: Too much, too wild and too skewed

How to formulate a suitable identity proofing strategy

In this podcast, Matt Johnson, Product Marketing Manager at TransUnion, talks about identity proofing and navigating identity during changing economic dynamics. By the end of this session, you’ll have an understanding of how to formulate an appro… Continue reading How to formulate a suitable identity proofing strategy