The cybersecurity environment has shifted dramatically in recent years, and that means yesterday’s tools and approaches – especially those which rely upon manual and/or siloed processes – will no longer suffice.
John Frizelle, the chief architect for mobile at Red Hat, details three steps to make mobile app development more secure.
Most IT managers are moving data to the cloud, but 40 percent of them believe doing that will weaken security of that data.
SafeGov.org aims to provide government with a greater understanding of the benefits of cloud computing.
Companies are considering insurance as a way to reduce risk and protect themselves from data breaches or hacks. Dr. Larry Ponemon tells us more about it.
Who’s using cloud more — the U.S. or Europe? What are the biggest concerns when it comes to security on both sides of the Atlantic? Should you be developing a cloud strategy now, or should…
June 15th The rapid convergence of security technologies combined with growing concerns about individual privacy are creating a need to understand the purpose of identification and credentialing in your environment and the impact on the public. Financial institutions and commercial services are adopting high tech methods to protect consumer access to convenient online transaction systems. Governments have adopted electronic identity documents to facilitate fast and convenient border crossing including ePassports, enhanced driver’s licenses, and RFID Passport cards. We are all aware of public space surveillance systems to reduce street crime in urban centers. Proposed identity credentials are to provide a trusted citizen identification solution for employment authorization including biometric verification. How will these identification systems foster trust and confidence by consumers that their personal information is secure and protected? Join us for a discussion with experts in the field of identification and credentialing to learn about how these innovations can meet security and consumer needs while managing the impact on privacy and civil liberties.
Learn more in today’s cybersecurity update.
Ponemon Institute study details why.