Advanced FiltersClear Filter
Star Rating
Categories
Blockchain to Biometrics: 2019’s Cybersecurity Trends

Blockchain to Biometrics: 2019’s Cybersecurity Trends

The 2020 editions to G2’s annual Digital Transformation Trends are in the works. In the past, I’ve written about all kinds of security trends from blockchain and biometrics to AI-powered threat intelligence and zero trust security.
by Aaron Walker
Two-Factor Authentication: A Valuable Addition to Account Security

Two-Factor Authentication: A Valuable Addition to Account Security

Humans are predictable. Sometimes, so are their passwords.
by Sagar Joshi
How Privileged Access Management Protects Critical IT Assets

How Privileged Access Management Protects Critical IT Assets

Every user account isn't created equal. 
by Sagar Joshi
Don’t Fall Prey to Spear Phishing: Protect Yourself Now

Don’t Fall Prey to Spear Phishing: Protect Yourself Now

Everyone wants to keep their information safe.
by Alexa Drake
What is Multi-Factor Authentication (MFA)? Types and Benefits

What is Multi-Factor Authentication (MFA)? Types and Benefits

Consider how much of your life takes place on a computer or a mobile device.
by Alexa Drake
The G2 on Privacy: What to Know About the NIST Privacy Framework

The G2 on Privacy: What to Know About the NIST Privacy Framework

The most valuable public companies in the world today are all driven by data.
by Merry Marwig, CIPP/US
2020 Technology Trends for Cybersecurity

2020 Technology Trends for Cybersecurity

This post is one part of G2's 2020 digital trends series. Read more about G2’s approach to digital transformation trends in an introduction from Michael Fauscette, G2's chief research officer.
by Aaron Walker
6 Characteristics of Corporate Culture to Better Your Company

6 Characteristics of Corporate Culture to Better Your Company

Have you ever seen the 1999 cult classic movie Office Space?
by Derek Doeing
What Is Penetration Testing? How to Protect Your Business

What Is Penetration Testing? How to Protect Your Business

Hackers are evolving continuously, and so are their methods. 
by Sagar Joshi
What Is Facial Recognition and How Does It Work?

What Is Facial Recognition and How Does It Work?

With an alarming spurt of security breaches and crimes, industries need a pivot from traditional security practices to facial recognition.
by Shreya Mattoo