A consultant colleague recently reached out with some questions on how to craft a good organizational information security policy. I’ve got experience with this, as a graduate-level legal instructor, ...
With the proliferation of mobile apps, their security becomes critical: apps store and transmit a lot of sensitive user data. This data can be vulnerable due to weak encryption, insecure storage, and ...
Data serves as the lifeblood of most businesses today, and safeguarding its security is imperative. I believe this commitment is not merely an obligation to uphold ethical and legal standards; it also ...
A week rarely goes by without a major data security breach. Recent news includes a breach impacting an energy company’s 8 million customers, another compromising the information on 450,000 current and ...
A data security threat is any action that could jeopardize the confidentiality, integrity or availability of data. Data security threats can come from a variety of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results