Use of blockchain technology has grown hugely this year. Job postings have grown more than 200 per cent, according to Indeed.com, and we saw some of the first uses for payments, data storage and even in...
Security firm iboss is disrupting the traditional VPN approach and enabling customers to access applications directly
The holy grail of I&AM is to actually improve the user experience while making the business more secure, but most organisations are a long way from that
Post Quantum's Classic McEliece algorithm is the only remaining contender in the code-based category of algorithms designed to protect communications from attacks using quantum computers
Cloud-based threat intelligence is the only way to keep ahead of the bad guys, says Check Point's Eddie Doyle