Skip to main content
FEATURED POST

Preventing Hyperjacking in a virtual environment

READ POST

sitting woman in yellow top holding credit card and tablet

Most recent posts

Considerations for an Effective Database Security Strategy December 2022 by Andrew Tweedie

Have you ever hidden a key to your front door under a rock and simply hoped that nobody would ever find it? Would you do the same thing with the keys to your database? Hopefully you wouldn’t! You collect and…

Top 5 Cybersecurity Predictions for 2023 December 2022 by Anudeep Parhar & Mark Ruchie & Greg Wetmore &

The cybersecurity arms race is accelerating. That’s the clear lesson of 2022 for those of us committed to protecting organizations from the perils of cyberattacks. We grow smarter and more capable by the day -- and so do the threat…

The proliferation of banking technology is enhancing the American consumer experience by leaps and bounds, and there’s demand for more December 2022 by Andy Cease

For more than a decade, the U.S. has been a laggard in the adoption of modern payment technology. Reliance on the magstripe years after peer economies had adopted chip-based payment cards, and the slow adoption of contactless-enabled “dual interface” payment…

From Applications to Marketplaces, more businesses are doing more business in the cloud December 2022 by Samantha Mabey

Cloud migration is nothing new – much like the digital transformation it’s been happening for some time. With the digital transformation what’s changed is the significant increase in pace. And with cloud migration what’s changed is the increase in cloud…

VIEW ALL POSTS

All Topics

All Contributors