California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change. Read More ▶ | | | Video/Webcast: TetraVX In this webinar, Dean Pipes, Chief Innovation Architect at TetraVX, will walk through how each organization's journey to the cloud is different and provide a complete and holistic view of what it takes to build a proper, and cost efficient, strategy and implementation plan. Read More ▶ | Phishing and impersonation attacks are up, and the C-suite is the weak link in email-borne attacks. Read More ▶ | | Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More ▶ | | Privacy seems like a pipe dream when everyone's data seems vulnerable. Do we just give up on it though? Read More ▶ | | | Cybersecurity firms often tout the use of data science, machine learning and artificial intelligence in their products. But there are consequential distinctions when you apply these techniques to specific cybersecurity use cases. Read More ▶ | | Is California's Consumer Privacy Act of 2018 (CCPA) poised to become the new standard in the United States? Read More ▶ | | Leadership and communication skills top the list of what's needed to succeed as a chief information security officer (CISO), while technical skills aren't nearly as important. Read More ▶ | | White Paper: Hitachi ID Systems, Inc. Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More ▶ | Editor's Picks | | | | |
0 comments:
Post a Comment