Ferma president Dirk Wegener has advised Europe’s risk and insurance management community to focus on tra...
Why do cyber insurers insist on IT security?
Every company is a technology company these days, so a robust information technology (IT) security...
Every company is a technology company these days, so a robust information technology (IT) security...
Article / 9 days ago
Creating the next generation of cyber insurance solutions - Insurance Business
Class underwriter digs into key cyber development...
Class underwriter digs into key cyber development...
Article / 10 days ago
We are in the midst of a revolution in the world of web development
The world of web development requires individuals to have a high level of skill and know-how to implement solutions across several coding languages....
The world of web development requires individuals to have a high level of skill and know-how to implement solutions across several coding languages....
Article / 2 months ago
Luxury, high-value handbags: what are collections worth?
Does your bag have the right level of protection?
Does your bag have the right level of protection?
Article / 3 months ago
Privileged Access Management is a critical element of internal cyber security
With an evolving threat landscape, understanding security protocols is vital. Read our guide on Privileged Access Management...
With an evolving threat landscape, understanding security protocols is vital. Read our guide on Privileged Access Management...
Article / 12 months ago
Will quantum computing break encryption?
Quantum computing once seemed to be from the world of science fiction. This tech is much closer to reality, but are tech professionals ready for the future risk?...
Quantum computing once seemed to be from the world of science fiction. This tech is much closer to reality, but are tech professionals ready for the future risk?...
Article / 1 year ago
Cyber-Attacks and the Risk to Critical Infrastructure
Automated systems run most of our critical infrastructure, but are they vulnerable to cyber-attacks? Dr Jessica Barker from Cygenta discusses the threat...
Automated systems run most of our critical infrastructure, but are they vulnerable to cyber-attacks? Dr Jessica Barker from Cygenta discusses the threat...
Article / 1 year ago
Why do people fall for phishes?
With new threats, cyber literacy is vital for the continued success of businesses. Find out more about one of the most common cyber security threats...
With new threats, cyber literacy is vital for the continued success of businesses. Find out more about one of the most common cyber security threats...
Article / 1 year ago
Why Multi-Factor Authentication (MFA) Matters
The rise of remote working has made Multi-Factor Authentication (MFA) vital for online security. Dr Jessica Barker from Cygenta discusses the benefits...
The rise of remote working has made Multi-Factor Authentication (MFA) vital for online security. Dr Jessica Barker from Cygenta discusses the benefits...
Article / 1 year ago
Learn more about APIs
Educating yourself on the importance of APIs can help you to have a better understanding of how data is consumed and how to protect for specific vulnerabilities...
Educating yourself on the importance of APIs can help you to have a better understanding of how data is consumed and how to protect for specific vulnerabilities...
Article / 2 years ago