The security of any IoT product should be seen as a functionality, not an add-on, and treated as an inherent component of any use case. Basic security good practices will vary depending on the usage of the product but should be part of any MVP.
Category: Information Security
There is a lot of confusion about the roles of Data Owners and Data Custodians. How the roles are different and who should be fulfilling them. This article looks to clarify and answer those questions.
Fraud prevention expert and Kount CEO Brad Wiskirchen explains how companies can both grow their digital business while reducing the costs of online fraud in this captivating interview.
How do you know who a person is online? How do you authenticate the person buying a product from you is the person associated with a credit card? As business...
We’re well in the swing of 2019, with plenty of exciting content and discussions for you to sink your teeth into. While the content we share is curated by us,...
We live in an expanding digital universe. Each year zettabytes of data are added to global information asset holdings according to recent analysis by IDC, expanding the potential attack surface for highly organised cyber criminals.
The digital universe increases in complexity continually, requiring cyber security practitioners to address a fundamental problem; how do we ensure this deluge of data is protected to the highest standards in the age of the mega-hack? The proliferation of data breaches during the last decade, including the 2017 Equifax breach which saw 144 million financial records extricated by highly motivated cyber criminals, highlights the limits of defensive cyber security.