Ransomware attacks: how to protect against real-life data hostage threatsRansomware attacks: what they are and how to protect against them using a disaster recovery plan. Read more
What is the digital identity?As we continue living much of our lives online, we need to close the security gaps in our identity ecosystem. It starts with… Read more
Mitigating sophisticated attacks — the nudata way (part II)It’s getting harder to tell humans and robots apart. Mitigating sophisticated attacks is possible, but requires behavioral defenses. Read on. Read more
Mitigating sophisticated attacks — the nudata way (part I)It’s getting harder to tell humans and robots apart. Mitigating sophisticated attacks is possible, but requires behavioral defenses. Read on. Read more