Cyberattacks on the Maritime Transport Industry The global economy relies heavily on maritime transport as […]
Read moreCyberattacks on the Maritime Transport Industry The global economy relies heavily on maritime transport as […]
Read moreAs one of the most financially damaging online crimes, BEC (Business Email Compromise) or EAC […]
Read moreWe hear about newly discovered data breaches every day, but rarely get to know the […]
Read moreWhat is public key infrastructure (PKI)? Public key infrastructure, or PKI – despite being […]
Read moreAs IAM becomes more important than ever in this age where we face massive cyberattacks […]
Read morePrior to the US presidential election back in 2016, most of the election forecasts suggested […]
Read morePenta Security, the first appliance-type identity and access management (IAM) solution provider in South Korea, […]
Read moreIn 1999, a 16-inch fuel line ruptured in the US spilling 277,200 gallons of gasoline […]
Read moreWe’ve been enjoying using signing and authenticating technologies since the late ’90s and back then, […]
Read more2nd Week of February 2020 1. Personal information of 6.5 million Israeli voters exposed […]
Read more