Cryptography is the last line of defense – and quantum computers will break that defense. Read what software company SAP will do to prevent this from happening.Read more
In the second episode of our editorial podcast on 5G security, we elaborate on the need of virtualization for 5G. On one hand, being software-based, virtualization makes 5G networks more vulnerable, while also vritualization opens up more possibilities for securing mobile networks.Read more
Insecure devices from the home networks might infect the corporate infastructure when we return to the office. We’ve had the chance to talk to Matthias Canisius about what strategies are best to securely go back to work.Read more
See our discussion with Eddy Willems, renowned security specialist and book author, about todays security landscape and how to protect yourself in it.Read more
In our first edition of a series, we’re giving an overview of 5G security and what it means for the future. Further in the series, we’re deep diving into the different topics of 5G security.
Join our editors Dr. Anand Prasad, Patrick Boch and Rajeev in understanding the full impact of 5G security.
In this second conversation with Prof. Banafa, we focus on the supply chain and the internet of things pertaining to privacy.Read more
Self-Protecting Data (SPD) are a relatively new concept for the cybersecurity industry.
We spoke with Jim Minie from Sertainty about use cases and implications of self protecting data for cybersecurity.
Theresa Payton, former White House CIO and CEO of Fortalice, shares her thoughts on the 2nd anniversary of GDPR.Read more
Following our video podcast with Prof. Ahmed Banafa, we asked what he thinks of the European GDPR and what it means for privacy.Read more
We had the chance to talk to Theresa Payton, Former White House Chief Information Officer and CEO of Fortalice Solutions about the recent attacks on healthcare organisations.Read more