Digital Darwinism: The technologies that will decide who survives and who disappears

The time of predictable rules in business is irretrievably gone, giving way to a relentless revolution driven by technology. Under…

Why every cable in a factory today is a potential entry point for a hacker

Just a decade ago, the industrial production line was a closed world. Machines ran on isolated networks and…

An investment that pays off – implementing Zero Trust architecture

Traditional security models are no longer effective. The 'castle and moat' concept - assuming that everything inside the…

Remote working must go hand in hand with IT asset security (interview)

Recently, there has been a sharp increase in interest in remote working due to the epidemiological threat. However,…