Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous. Read More ▶ | | | Video/Webcast: TetraVX In this webinar, Dean Pipes, Chief Innovation Architect at TetraVX, will walk through how each organization's journey to the cloud is different and provide a complete and holistic view of what it takes to build a proper, and cost efficient, strategy and implementation plan. Read More ▶ | California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change. Read More ▶ | | Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take. Read More ▶ | | | Stressed and stretched, IT security teams look to automation for relief. Read More ▶ | | New reports show big differences in risk among public, private, and hybrid cloud deployments. Here's advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy. Read More ▶ | | Two blockchain projects hope to prevent bot authentication issues before they start. Read More ▶ | | Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks. Watch Now ▶ | | White Paper: Hitachi ID Systems, Inc. Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More ▶ | Editor's Picks | | | | |
0 comments:
Post a Comment