Faces, fingerprints, behaviour and blood: Who leads the pack in authentication innovation?
I remember the first time I used a fingerprint scanner on a laptop I’d been…
thedigitaltransformationpeople.com
I remember the first time I used a fingerprint scanner on a laptop I’d been…
thedigitaltransformationpeople.com
These days, most of the Global Banking organizations have a regular practice of undertaking an…
thedigitaltransformationpeople.com
Modern technologies have given rise to smarter, more efficient devices. Things like the Amazon Echo,…
thedigitaltransformationpeople.com
World-class interim transformation leaders and subject matter experts for maximum impact on your business. No agency fees.
When Steve Jobs first introduced the front-facing camera in the iPhone camera in the iPhone…
thedigitaltransformationpeople.com
Several years ago, a series of massive and highly publicized retail data breaches took the…
thedigitaltransformationpeople.com
We've all done it at some point, opened an attachment within a suspicious looking email…
thedigitaltransformationpeople.com
Researchers from Israeli Cyber Security Company Cybellum have discovered a zero day bug that impacts…
thedigitaltransformationpeople.com
On Tuesday 7th of March 2017, WikiLeaks began its new series of leaks on the…
thedigitaltransformationpeople.com
Working in cyber security for the last 19-years has been an amazing experience. Watching the…
thedigitaltransformationpeople.com
A Physical-Presence-on-the-Internet (Cyber PPI) access model is the first step to cyber security. Until this…
thedigitaltransformationpeople.com
As surely as the sun rising in the east, the state of cyber security can…
thedigitaltransformationpeople.com