Latest Blogs
The future is trending more and more towards a fully end-to-end passwordless authentication process. Join Johnathan Padilla and Adrien Julienne from Keeper Security to learn how organizations can move to a passwordless future with passkeys, SSO and biometrics.
On June 15, 2023, the residents of Spring Valley, IL woke up to the sobering news that St. Margareth’s Health hospital, one of only a few hospitals in the region, would be closing. The cause of the closure? A devastating cyber attack.
Learn about TikTok's data collection and why it's a cybersecurity risk, how threat actors can use the collected data and how to protect yourself.
ECC is a public-key cryptography method based on the mathematics of elliptic curves. First proposed in 1985, it recently rose to prominence with modern cryptography as it provides a higher level of security compared to traditional encryption methods.
In February of 2021, one of the operators at the City of Oldsmar’s water treatment system noticed a change in the water supply. The level of sodium hydroxide was abnormally high, which would have been lethal for residents if ingested in large amounts.
As the world continues to change, so does the nature of warfare, where the Internet has become the main battleground for most of the world’s conflicts. But where is this headed?
Rising concerns surrounding climate change have forced governments and companies alike to push for a faster adoption of Electric Vehicles (EVs).
Whether it’s in the B2B or B2C world, it can be challenging for an email to stand out in the overflooded inbox of your target audience. Here are some key things to consider when building an email campaign.
Education & Skills
Find more information about my profile including education, skills and background.