Technology Industry

Technology Industry | News, how-tos, features, reviews, and videos

sacramento california state house

How citizen ownership of data impacts business going forward

Is California's Consumer Privacy Act of 2018 (CCPA) poised to become the new standard in the United States?

facial recognition - biometric security identification

DAM if you do and DAM if you don’t

How Digital Asset Management and identity management are perfect partners.

sad angry unhappy frustrated hands holding sign andre hunter 350301 unsplash

Lack of confidence in data security can cost you more than you think

The majority of companies don’t understand the value of their data, because they aren’t taking the necessary steps to study the information they are gathering from customers.

blockchain links

How are small businesses adopting blockchain technology?

How and why small businesses are taking advantage of blockchain technology to improve their business models – from their cloud storage to their payment methods.

red padlock cybersecurity threat ransomeware

10 ways to prevent, detect and recover from ransomware and zeroday threats

As ransomware runs rife the threat of extortion and disruption looms large. Find out what practical steps you can take to prevent ransomware from gaining a foothold and to detect it when your defenses fail.

facial recognition access identification biotech

Strength in knowledge: How connected identity and access management transforms secure access

Connecting systems and sharing intelligence are key to fighting cybercrime—because even the most robust identity and access management solution can’t do it alone.

binary code

The quantum computing cyber storm is coming

What cyber leaders need to know now to protect their critical data in the quantum era.

gdpr

GDPR: Where are we now?

GDPR became the law of the land in Europe on May 25th. The impact has been felt across the globe...

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

Security versus usability a conundrum in modern identity management?

Convenience and usability vs. security when dealing with a valuable verified identity.

file folder storage and sharing

How cloud storage solutions are evolving to fight hackers

Decentralized cloud services are disrupting the industry, increasing security and more. Here's how these companies are looking to the future and designing a new breed of storage solutions: decentralized, blockchain-backed cloud...

login credential - user name, password - administrative controls

The great identity re-architecture: enabling trust and interoperable credentials

What happens to all of the consumer and employees accounts online that are created but seldom used? Today digital identity information is replicating faster than the plastic waste in our landfills and oceans, and the harmful side...

number 4 four with binary grunge background

4 reasons why CISOs must think like developers to build cybersecurity platforms and stop investing in ‘silver bullets’

The Chief Information Security Officer is the latest addition to the C-suite with funding, staff and authority to ensure the confidentiality, integrity and availability of corporate digital assets. The CISO must quickly shed the...

number 4 four film strip

4 cybersecurity developments to watch in 2018

Be ready for when the future arrives, start monitoring a pipeline of emerging technologies.

sun in clouds solar

Adapting to security’s new reality

The cloud has made its way into everyday vocabulary; even non-tech startups and consumers have an awareness of cloud computing and its impact. As it’s shifted the technology landscape, it’s also impacted the security landscape – not...

facial recognition - biometric security identification - binary face

Connecting ABAC to identity governance and administration to extend access control capabilities

Enterprises need an approach to improve synergies between existing IAM technologies.

1 fake profile

Why we need to be worried about deepfake videos

The potential security threat of realistic fake videos of people doing and saying things they never did is cause for concern. Learn why and how they were developed, the risk they might represent when they spill beyond the world of...

whyhpcmatters frauddetection 1000

3 things your marketing department can teach your CNP fraud prevention team

You may be surprised to learn that your marketing department can teach your fraud prevention team a lot about card not present fraud. Not only are the two departments working in tandem to reach the same goals, but the marketing...

government cios without authority washington columns executives

How agencies learned to stop worrying and love the blockchain

A little uncertainty is a small price to pay for the promise of better security.

think ponder reflect

Cybersecurity – how confident (complacent?) are you?

Cybersecurity must be a process of continual evolution: just because you feel protected today doesn’t mean you will be tomorrow.

private public hybrid cloud technology sign

Our digital data is more valuable than our non-digital data. So why do we care less?

A framework to protect our digital data using a shared responsibility model based on data value.

Load More