
On the use and abuse of encryption
As more of our lives and identities move online and into a virtual space where a stunning amount of information
As more of our lives and identities move online and into a virtual space where a stunning amount of information
Varonis’ Field CTO and hacker Brian Vecci spent his life breaking into computers. With the roll-out of 5G, the number
How secure is the personal health data we submit and generate through wearable devices like fitness trackers and health apps? And who owns the data?
In a not-too-distant future, cars would not only connect to wireless networks but also communicate with each other on the road.
Nokia’s Head of Portfolio Strategy and Investments, Simon Osborne, joins the Futurithmic podcast to discuss the complexities of wireless security with 5G.
Companies are putting their own IT systems to the test, hoping to spot and fix infosec vulnerabilities before real hackers can do irreparable damage.
The alarming potential of biometrics and image tracking has generated several anti-surveillance solutions, aimed at protecting users’ data.
This is an non-necessary category.