Combatants are actively using cyberattacks to harm and impair the enemy's digital capabilities as a crucial strategic advantage both on and off the battlefield.
Learn moreBlog
How does data autonomy concern you?
Technology
Technology
Cyberattacks on critical infrastructure have been rising in numbers. But what does an attack really mean for the society?
Learn more23-0116/
Data security at the hardware level
Technology
Data security at the hardware level is one of BACKBONE's key features. Read in this blog why data security is so important.
Learn more22-1102/
Spyware on your phone
Technology
Spyware can integrate itself into an Android phone's operating system - in this blog we discuss how to identify spyware on your phone.
Learn more22-1004/
The IoT and Cyber Security in 2023
Technology
With the expansion of the IoT also come threats that could seriously damage the very vulnerable system of the IoT.
Learn more