People who understand information governance, privacy, and security should be active participants on the distributed ledger technology implementation team to ensure success. Blockchain, or distributed ledger technology (DLT), is...
Read morePeople who understand information governance, privacy, and security should be active participants on the distributed ledger technology implementation team to ensure success. Blockchain, or distributed ledger technology (DLT), is...
Read moreDespite the growing sophistication of threats and increase compliance requirements, a high percentage of organizations are continuing to compromise their security. A high percentage of organizations are exposed to...
Read moreDespite the growing sophistication of threats and increase compliance requirements, a high percentage of organizations are continuing to compromise their security. A high percentage of organizations are exposed to...
Read moreNames, addresses, Social Security numbers, and birth dates may have been pilfered in the attack. Georgia Tech this week revealed that an attacker infiltrated a central database and stole...
Read moreNames, addresses, Social Security numbers, and birth dates may have been pilfered in the attack. Georgia Tech this week revealed that an attacker infiltrated a central database and stole...
Read moreWhen selecting targets, attackers often consider total cost of ‘pwnership’ — the expected cost of an operation versus the likelihood of success. Defenders need to follow a similar strategy....
Read moreWhen selecting targets, attackers often consider total cost of ‘pwnership’ — the expected cost of an operation versus the likelihood of success. Defenders need to follow a similar strategy....
Read moreA wide variety of financial services companies’ apps suffer from poor programing practices and unshielded data. Mobile apps for financial services are an important part of many consumers’ financial...
Read more
Recent Comments