There are several key attributes that any security or IT manager should consider before purchasing a video surveillance storage solution. Here's a checklist as you’re reviewing the market’s options to ensure your critical needs are addressed prior to purchasing.
2022 is just around the corner, and we are already following new developments in cybersecurity that will significantly impact your business in this upcoming year and the rest of the decade.
The tech giants that the CCPA attempted to target were able to escape liability by capitalizing on a convenient loophole that excluded data analytics from the definition of a sale. New CCPA enforcement letters could have major implications for the broader data ecosystem —
third-party data may disappear as we know it. The time has come to provide consumers with value for opting in.
Miro Pihkanen joins OwlGaze as their new Chief Security Officer (CSO) and Board Member. In his security and advisor roles, Pihkanen will help the organization finalize a cyber threat detection solution.
LendingHome, a real estate loan provider, has named Carrie Weber their new Chief Risk Officer. Weber will develop a risk management strategy for the firm and oversee risk and compliance issues.
Your organization risks compliance and disaster protection shortcomings unless your data management practices catch up with the evolution of information sharing.
Your organization risks compliance and disaster protection shortcomings unless your data management practices catch up with the evolution of information sharing.
Information security leader Peter Hoff joins Wursta as the Vice President of Cyber Security and Risk, developing risk assessment and cybersecurity tools for the firm.
Howell will create a cybersecurity program for the institute and work alongside other senior-level members of Georgia Tech's information technology department.
New consumer privacy laws and innovative fraudsters have given security professionals much to do in a supercharged digital economy. As our digital footprints widen, bad actors are finding increasingly sophisticated ways to access troves of personal information and sensitive data.