It Is Not Always Necessary to Get User Consent Under the New GDPR Regulation

This article is for those businesses that serve customers in the European Union. This article explains why you should not always ask the customer for his permission to process personal data. GDPR and... Go on to the site to read the full article ... Read More

Insider Threat: How to Protect Your Business from Your Own Employees

It’s trite to write that the company’s data and customer base are the main assets of any business in the 21st century. However, the attitude to these assets is still careless: a sales... Go on to the site to read the full article ... Read More

Top 10 Solutions to Protect Against DDoS Attacks and Increase Security

According to statistics, 33% of businesses fall victim to DDoS attacks. It is almost impossible to predict such attacks. Some of them can be powerful and reach 1.35 TBps. According to Incapsula, DDoS... Go on to the site to read the full article ... Read More
Basic Principles of Ensuring iOS Apps Security

Basic Principles of Ensuring iOS Apps Security

The development of any mobile application requires serious attention to privacy and security. This is especially important for applications that work with personal information. This article reviews... Go on to the site to read the full article ... Read More
Blockchain networks: possible attacks and ways of protection

Blockchain networks: possible attacks and ways of protection

Any network can be attacked, and blockchain is no exception. However, attacks on distributed ledgers differ from attacks on conventional computer networks, even secure ones. Here crooks try to... Go on to the site to read the full article ... Read More