With data breaches climbing to a new record high last year, businesses are turning to emerging technology to protect themselves and their information. The 2018 Thales Data Threat Report shows that almost...
The holy grail of I&AM is to actually improve the user experience while making the business more secure, but most organisations are a long way from that
Post Quantum's Classic McEliece algorithm is the only remaining contender in the code-based category of algorithms designed to protect communications from attacks using quantum computers
Cloud-based threat intelligence is the only way to keep ahead of the bad guys, says Check Point's Eddie Doyle