What have successful companies done differently when it comes to digitalisation? Who are the winners in digitalisation? Who are the significant losers? Digitalisation has reshuffled the deck. Those who were… [Continue Reading]
Secure Digitalisation: Luzerner Kantonalbank’s Crowdvoting Platform
Secure digitalisation in banking sector: Luzerner Kantonalbank has protected its crowdvoting platform with USP’s web application firewall Secure Entry Server®.
EU Data Protection Regulation and How It Affects Swiss Multinational Companies
Europe as a whole, in general terms at least, takes a strong stance on the privacy of individual’s data. In 1981, the 47 EU countries agreed to sign a treaty… [Continue Reading]
Future Trends and Standards in Authentication
Logging into an account has been a fundamental part of computing since the beginning. The first computer password, used at the Massachusetts Institute of Technology, back in 1963, provided a… [Continue Reading]
To Err Is To Be Human: Why Cyber Attacks Need The Human Touch
Security awareness is not enough to prevent cyber security. We must use authentication technology, live insight into potential threats and understand the human behaviour.
The Impact of GDPR On Companies Providing Web Access to Applications
New: Free In-Depth Webinar Learn how to get GDPR ready in one single step implementing risk based authentication and web-based protection from cyber-attacks. Subscribe now Personally Identifying Information (PII) has… [Continue Reading]
Keeping The Channel Secure: Vendor Risk Management and Cyber Security
How can businesses keep the channel secure in an age of out of control cyber threats? Learn more about vendor risk management and cyber security.
Top 5 Cyber Security Risks For Companies
One of the best ways to understand any given concept is to classify it. Classification is used across many disciplines, from biology to data science. Being able to group ideas,… [Continue Reading]
Fighting Cyber-Crime with Cyber-Security
The IT industry is famous for constantly inventing new buzzwords. Sometimes, they describe new technologies and sometimes, they are just there to show well known technologies in a new context…. [Continue Reading]
The Mobile Hacker
By 2014 there were more mobile devices than people in the world. Looking at the GSMA device tracker today, shows a world filled with almost 8 billion devices, and nearly… [Continue Reading]