For a long time the consideration of IT security risks in many companies was dominated by the assumption that they themselves did not represent a worthwhile target for attackers and… [Continue Reading]
Cybersecurity has never before had such a high profile. The reasons for this are simple. Cyber security threats and successful attacks have exploded in the last few years. Since 2013,… [Continue Reading]
Secure digitalisation in banking sector: Luzerner Kantonalbank has protected its crowdvoting platform with USP’s web application firewall Secure Entry Server®.
Europe as a whole, in general terms at least, takes a strong stance on the privacy of individual’s data. In 1981, the 47 EU countries agreed to sign a treaty… [Continue Reading]
Logging into an account has been a fundamental part of computing since the beginning. The first computer password, used at the Massachusetts Institute of Technology, back in 1963, provided a… [Continue Reading]
Security awareness is not enough to prevent cyber security. We must use authentication technology, live insight into potential threats and understand the human behaviour.
How can businesses keep the channel secure in an age of out of control cyber threats? Learn more about vendor risk management and cyber security.
One of the best ways to understand any given concept is to classify it. Classification is used across many disciplines, from biology to data science. Being able to group ideas,… [Continue Reading]
By 2014 there were more mobile devices than people in the world. Looking at the GSMA device tracker today, shows a world filled with almost 8 billion devices, and nearly… [Continue Reading]
In late 2014 a major bank cyber heist was spotted. This has become known as the infamous ‘Carbanak’ attack and may have resulted in over $1 billion being stolen from… [Continue Reading]