Previous Article
Decentralized Identity Attack Surface – Part 1
Decentralized Identity Attack Surface – Part 1

Introduction Who are you? That’s a hard question to answer. Many philosophers have been fascinated with thi...

Next Article
Deutsche Telekom CSO on the New Rules of Data Privacy
Deutsche Telekom CSO on the New Rules of Data Privacy

The dramatic uptick in data breaches these last few years, fueled by pandemic-era changes and the rise of r...