Proving your credentials – A potentially more secure future via Blockchain

Your digital identity is the gateway to your data, and increasingly, this includes most facets of your everyday life. Whether it’s your social media...

GDPR: What comes next?

For those who have been hidden under a rock for the past two years, GDPR (General Data Protection Regulation) is a regulation in EU...

Impact of GDPR on Biometric Systems

Many organisations and developers are worried about the impact of GDPR on biometric solutions, so let’s explore the main security and compliance considerations involved....

When does no news mean good news?

I wonder how many C-level managers went on this May Bank Holiday with a bit of trepidation. Not that the GDPR legislation has incidentally...

Editorial: GDPR readiness consumed much of peoples time this year where...

One of the benefits of being both editor of this magazine and an industry executive in a commercial cybersecurity business is the observation gained...

A pearl of culture: Bluetooth

Nowadays, it would have been possible to communicate via club-foot. That reality would have happened if a consortium of Indian and Soviet industries had...

C4, Cyber and Digital Transformation

Since the 1980s, we have seen several successive computer cycles: the first was that of personal computers, in the 1980s. Then came the Internet,...

Cyber criminals have no boundaries! Dakar, Senegal

BIO Marco Essomba is a Certified Application Delivery Networking and Cyber Security Expert with an industry leading reputation. He is the founder and CTO of...

The hidden risks of mobile phone systems

Author: Giancarlo Butti BIO Giancarlo Butti, MBA in Business management and organization development by the Polytechnic University of Milan, is a passionate of ITC, of...

When sport can become a national security issue.

BIO Nicola Sotira is Director General of the Global Cyber Security Center of Poste Italiane and Information Security Manager in Poste Italiane. He is in...