Did you know that your computer password isn’t a secret for me?

Did you know that your computer password isn’t a secret for me? Did you know that when you are at lunch, I can see your messages, photos and browser history? Who am I? I’m not even a hacker  I could be your colleague, or just share an office space with you, or be a security officer […]

From Rubens to RSA. Evolution of Physical and Digital Keys

Cybersecurity Wearables. The Evolution of the Form Factor. Part 2: From Physical to Digital Keys Offensive security is the oldest and most effective. We saw it in the hominid with a stick example from the previous post. However, “offensive” means gear, human resources and brings along with it, an increased risk of counterattack. That’s why […]

How Did a Wristwatch and a Scabbard Influence Cybersecurity?

Cybersecurity Wearables. The Evolution of the Form Factor. Part 1 Several hundred thousand years ago, an ape learned about carrying around a stick to protect himself and his family from predators and rivals. Then one day he tied the stick to his body with a piece of twine. This device left his hands free of […]

Backup Security: How Safe Is Your Backup?

Backup Security: How Safe Is Your Backup? And How to Make Sure It Actually Backs You Up. The airplane is slowly taxiing on the runway to the takeoff. You look at the airport through the window, relax in the seat and place your laptop in the forward compartment. The flight attendant gently taps your shoulder […]

The Afterlife of Devices

How You Can Improve Your Device Authentication and Avoid Trouble After Your Personal Device Is Lost? What if it gets lost or stolen? This is the question we usually ask ourselves when buying a smartphone or tablet. We should also ask this question every time we install a banking app, set up corporate email on […]

Cart Item Removed. Undo
  • No products in the cart.