Cyber security news for all

More

    Instructions

    What are biometric methods used for?

    Biometric authentication issues are used more and more frequently. In addition to fingerprints and face recognition, behavioral biometrics is gaining in importance. This approach...

    Software supply chain attacks and open source development

    Increasing cloud infrastructures and DevOps environments ensure more agility in companies, but at the same time expose them to higher dangers. Even so, supply chain...

    Recent Articles

    Stay on op - Ge the daily news in your inbox