
Addressing Internal Cyber Vulnerabilities
In cybersecurity, it’s easy to become obsessed over external malicious factors and lose sight of the whole picture which includes internal vulnerabilities. When it comes to cybersecurity, the best defense…

Why Digital Transformation is Taking the Shipping Industry by Storm
In Medieval Italy, sea merchants invented the bill of lading to confirm receipt of all goods in a shipment. Hundreds of years later, many international shipping firms still rely on…

Securing Silos: The Case for an Omnichannel Approach to Digital Government
What if government worked like a business? What if a bureaucrat in one department could communicate seamlessly and securely with a politician in another? What if departments could work collaboratively…

The New Diverse World of Secure Communications
Dial back the clock several million years and you find a crowded ocean of creatures surrounding lush green lands devoid of any vertebrate activity. Then one fish walked out of…

Secure Digital Communications for a Digital First Government
In addition to caring for its citizens, a good government communicates with and listens to its citizens’ questions, concerns and comments. But, in today’s digital world, where private sector corporations…

From large conglomeratic banking institutions to massive global shipping firms, the world’s ‘upload to all-things-digital’ continues at breakneck pace. And so does the patchwork list of regional, national and even…

How to Make a Business Case for Encryption
Digital communication is a competitive advantage over snail mail because it’s faster and cheaper. But cost savings can disappear the instant an organization experiences a breach, which is all too…

Insider Cyber Threats? Closer to Home than You Think!
For enterprise-level organizations, it’s no longer enough to protect data and systems from nefarious external agents. Organizations must also implement defensive measures to protect themselves from something much closer to…

Encryption in Healthcare? Improving the Prognosis of Data Security
Healthcare organizations collect, manage and distribute an enormous amount of medical and personal information and they’re constantly at the mercy of budget constraints and cuts, which leaves them vulnerable. On…