Say hello to the cyber bloc party
As the cybersecurity arms race heats up, we're heading for balkanisation levels not seen since the cold war
How to use
Cybersecurity expertise for more than just experts
How to use
To navigate through the magazine use the on-screen page arrows or the right and left arrow keys on your keyboard. Use your mouse wheel or the scrollbars to read through each article.
On the bottom right of the page there are three menu buttons: home, contents and full screen. To return to this cover page you can either use the home or contents buttons, or click on the Verdict Encrypt logo at the top of each article.
Tablet and mobile
To navigate through the magazine, simply swipe right and left, or tap on the page arrows. To read an article, swipe up.
On tablets there are two menu buttons on the bottom right: home and contents. On mobile devices there is only contents.
To get back to the cover, either click home or the Verdict Encrypt logo located at the top of each article.
GDPR and Cybersecurity: Compliance Beyond Software Selection
Artificial Intelligence: Skills Gap Solution or Threat to Enterprise?
Drowning in Data: Transforming Threat Intelligence for the Better
In Data: The Changing Cybersecurity Vendor Landscape
The Emerging Role of Telcos in the Cybersecurity and What it Means for Business