skip to Main Content

A Path to Achieving Network Security ZEN

Finding a balance between a pleasant user experience and stringent security requirements can be a challenge. User authentication has become increasingly complex over the years, blending usernames and passwords with second factor authentication, like One Time Passwords (OTP). In many…

Read More

But Who Will Do the Work Then?

Artificial intelligence is transforming knowledge work “Machines that can change society, and have been much dreamed of, are now here in the shape of networked computers and robots, fed by data whose figures far exceed the human imagination, and increasingly…

Read More
Back To Top