Security | News, how-tos, features, reviews, and videos
The European Parliament has voted to curtail transatlantic transfers of personal information
Make sure you have customers' consent for everything you do with their data
An identity and access management solution helps the technology company provision and deprovision identities for thousands of employees and supply chain partners, allowing CIO Gus Shahin to move on to more strategic efforts, including machine learnin
Federal agencies are starting to use data provided by routine cybersecurity protocols to identify new ways to increase efficiencies and optimize citizen service.
This Cybersecurity Awareness Month, we’re reminded that today’s cybersecurity landscape is rapidly evolving and advanced, proactive, and comprehensive security technology is not optional but essential.
Workday's home-grown risk management tool offers a strategic boost by facilitating communication between security teams and business leadership.
Patching old systems, migrating email to the cloud, unsupported compliance mandates, and ERP upgrades are some of the jobs IT pros dread most.
Legal uncertainties shutter previously accessible databases used to identify fraudsters, criminals, thieves and hackers.
Doubling down on individual control makes GDPR an expensive nuisance for enterprises while failing to protect consumers against likely data harms.
As cyber attacks continue to increase in number and escalate in complexity, companies are looking to hire hard-to-find cybersecurity experts to help secure their needs. Hereu2019s a look at the four most in-demand cybersecurity skills for 2018 and be
Sponsored Links