Data Security, Enterprise Identity, Software Security

Cisco Spaces – Privacy and Data Protection

December 2, 2022

Cisco Spaces – Privacy and Data Protection
Cisco Spaces is an indoor location services cloud platform that provides wireless customers with rich locationbased services, including location analytics, business insight, customer experience management, asset tracking, Bluetooth Low Energy (BLE) management, and API.

Spotlight

sero security

Being a small, boutique operation allows us to invest time into researching, analysing and understanding new threats and vulnerabilities without having the burden of working in a large corporate environment. Our penetration testers are passionate about cyber security and work hard to build a strong knowledge base and stay ahead of the curve when it comes to the ever-evolving cyber threats – It’s in our blood! It’s what we do! We work independently of any security product vendors, which means we are able to offer completely unbiased advice that is tailored to your needs and requirements. We will never try to sell you anything.

OTHER WHITEPAPERS
news image

AI Security White Paper

whitePaper | January 23, 2020

With the accumulation of big data, dramatic improvements in computing power, and continuous innovation in Machine Learning (ML) methods, Artificial Intelligence (AI) technologies such as image recognition, voice recognition, and natural language processing have become ubiquitous. Meanwhile, AI poses a significant impact on computer security: on the one hand, AI can be used to build defensive systems such as malware and network attack detection; on the other hand, AI might be exploited to launch more effective attacks.

Read More
news image

Warring State - China's cybersecurity strategy

whitePaper | December 1, 2019

Cyberspace and information technology have enabled the economic, political, and cultural inte - gration of the United States and China. However, interdependence creates costs as well as benefits. Increased interconnection has also contributed to major obstacles in the bilateral relationship, generating mutual distrust of incentives, actions, and norms in cyberspace. Information technology raises new challenges for states by allowing actors to exploit networks, conduct cyber espionage, or compromise national security with greater ease.

Read More
news image

Zero Trust: Your Digital Transformation Requires a Risk Transformation

whitePaper | September 28, 2022

Modernizing your technology landscape requires a parallel cybersecurity strategy because your users and data are no longer protected by the corporate firewall. While the cloud provides unsurpassed agility, it also exposes new threat vectors. Your digital transformation must be accompanied by an innovative and comprehensive approach to reduce risk and attack surfaces.

Read More
news image

Dashlane - Security White Paper August 2022

whitePaper | August 30, 2022

Access to the user’s data requires using the User Master Password which is only known by the user. It is used to generate the symmetric Advanced Encryption Standard(AES) 256-bit key for encryption and decryption of the user’s personal data on the user’s device. We useWebcrypto API for most browser based cryptography and the native libraries for IOS and Android.

Read More
news image

Unify data security, privacy, and governance with contextual data classification

whitePaper | November 29, 2022

Enterprise data can be a transformative asset. It can unlock insights and intelligence to fuel innovation, accelerate organizational growth, and create a significant competitive advantage — so long as it’s properly used.

Read More
news image

Brivo Access Information Security White Paper

whitePaper | August 26, 2022

As a provider of physical security services, we at Brivo believe that information security is of paramount importance to maintaining the safety and security of your facilities, and the privacy of your data. That’s why information security has been a consideration since day one.

Read More

Spotlight

sero security

Being a small, boutique operation allows us to invest time into researching, analysing and understanding new threats and vulnerabilities without having the burden of working in a large corporate environment. Our penetration testers are passionate about cyber security and work hard to build a strong knowledge base and stay ahead of the curve when it comes to the ever-evolving cyber threats – It’s in our blood! It’s what we do! We work independently of any security product vendors, which means we are able to offer completely unbiased advice that is tailored to your needs and requirements. We will never try to sell you anything.

Events