Fitness devices like Fitbit may no longer be used just for tracking physical health. U.K. researchers are looking into using fitness tracker technology to make people more aware of potential cyber threats and encourage them to take proactive action.
It’s a reality that companies are outsourcing almost every aspect of their operations thus effective vendor risk management is becoming more crucial, how should you do it?
One year on, the technology to support true data privacy and fully comply with GDPR is still lacking, and regulators have come face to face with the reality that we are still years away from being there.
Privacy regulators have said they will take seriously anything that puts the twin principles of openness and honesty into jeopardy, and with the GDPR honeymoon period set to end, trust and reputation will be central going forward.
Edge computing eliminates latency and brings information closer to the location of where it is needed instead of far away servers, it provides performance benefit and gives the control of data privacy back to users.
It’s not enough to just keep up to speed with the latest cyber threats as it’s the unknowns which threaten company data assets, so what do we do about the unknowns?
Protecting your client’s private information is crucial for a business, learn more about security measures to prevent data breach and guarantee safety of information in the online world.
Meet Bob. Bob’s an employee at BigCorp, and he’s confused. He’s got info security folks requiring him to take annual...
U.S. government agencies warned of new wave of password spraying attacks with Citrix serving as one of the latest victims of such “low and slow” hacking campaigns.
Google Chrome's new privacy tools for controlling online tracking and Brave's new model for sharing 70% of ad revenues with users are raising concerns for ad platforms.