
Biometric data security (1)
Biometrics—automatic recognition of fingerprints, irises, faces, voices, palm prints, behavioral signatures, etc.—have become a pillar of authentication in our digital and physical lives. The promise

Biometrics—automatic recognition of fingerprints, irises, faces, voices, palm prints, behavioral signatures, etc.—have become a pillar of authentication in our digital and physical lives. The promise

In the first part of this article, we traced the origins, objectives, and main features of European Cybersecurity Month. We saw that it is an

Every year, October is dedicated to European Cybersecurity Month, a crucial event for digital protection. Coordinated by the European Union Agency for Cybersecurity (ENISA) and

As the new school year begins, digital fatigue is spreading across organizations. Too many alerts, too many tools, and too many messages. Ultimately, no one

Our second article on cybersecurity during the summer will focus on how to make a successful digital return to work. The holidays are coming to

It’s a scene that we have seen many times; on a beautiful Greek beach, an executive reviews a contract on his tablet and responds to

The emergence of conversational artificial intelligence is profoundly changing the way content is consumed and monetized on the web. Traditional models based on classic SEO

For more than two decades, the web has been structured around an implicit but effective pact: internet users accessed a variety of content—articles, tutorials, videos,

In the first part of this article, we saw how crypto-currencies, originally designed to foster financial independence, have been massively hijacked by cybercriminals: ransomware, money

At the outset, crypto-currencies were the stuff of dreams: an autonomous financial system, free from banks, states and borders. More transparency, more freedom, more privacy.