Blogs

blockchainCybersecurityIdentity & Access management/ IDaaS

Blockchain vs The Password

The obituary of the password has been written and re-written. After all, we’re well aware of the shortcomings of this humble form of authentication. 
Application ServicesApplicationsGovernance

Do you embrace challenges?

Deals we work on are becoming unusual or non-standard and the roles we now have in response to this changing environment are also becoming more varied, interesting, and rewarding.
CybersecurityUtilities

Cyber threats to power grids

Public utilities such as electricity distribution networks are vulnerable and clear targets for cyberattacks. The list of possible enemies is great and the motivations are many. The immediate need is to hasten the development of risk mitigation capabilities.
cookies.

By continuing to navigate on this website, you accept the use of cookies.

For more information and to change the setting of cookies on your computer, please read our Privacy Policy.

Close

Close cookie information