Security | News, how-tos, features, reviews, and videos
Letu2019s be careful not to shortchange the free flow of public data in the rush to pass new privacy.
Companies need both AI-driven automation and trained personnel to combat shape-shifting cyberthreats
If the dark day comes when the internet does experience a global crash, the thing that takes it down will be, almost by definition, the thing we didn't see coming.
Proposals to require companies to share their data are riddled with flaws and solve no pressing marketplace defects.
In light of new laws from Europe and California privacy needs to be on the Congressional agenda.
After the infamous Sony Pictures hack in 2014, the financial services industry came together to develop Sheltered Harbor to ensure customer financial data would remain secure and accessible in the event of a cyberattack.
Identity resolution is the key to delivering personalized engagements. To be successful in delivering these engagements, there are three important business applications that build the base to help drive personalization at scale.
Sprintu2019s open source Elastic Stack analytics implementation helped the mobile device and network provider reduce mobile phone fraud by 90 percent.
How prepared is your organisation to deal with the fallout from a cyber attack?
The furor over u201cdark patternsu201d reveals the limits of consumer control as the primary tool of data protection.
Sponsored Links