This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Former emergency communications leader Mel Maier has been named Chief Technology Officer (CTO) at the Association of Public-Safety Communications Officials (APCO) International.
As public officials and enterprise leaders work to build electric vehicle (EV) charging infrastructure across the United States, cybersecurity professionals in the energy and transportation sectors should consider how best to secure the technology.
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has published the results of the 2020 Privacy Technology Demonstration (2020 Demo). Five privacy systems participated in the event, demonstrating their ability to detect and blur faces in a challenge video created by S&T.
The National Institute of Standards and Technology (NIST) has a new document, Artificial Intelligence and User Trust (NISTIR 8332), that is now open for public comment until July 30, 2021. The document's goal is to stimulate a discussion about how humans trust artificial intelligence (AI) systems.
5G, as often happens with new technologies, will likely introduce both digital and business revolution along with a plethora of new threat vectors. In particular with the exposure of new connected devices, industries and services, and sensitive assets will undoubtedly be affected by new cyber threat agents; the EU, however, is ready to mitigate these potential threats.
Quantum technology has begun and will continue to result in the introduction of new products and services into the global marketplace - all of which have security implications.
Quantum computing has begun to facilitate a leap forward in unique computing capabilities, but they pose substantial security threats that must be evaluated and addressed.
Led by Noam Rotem and Ran Locar, vpnMentor’s research team recently discovered a breached database belonging to plastic surgery technology company NextMotion.
ON DEMAND: There are numerous technology approaches to choose from though and it can be confusing, so join Quantum Corporation for this webinar and learn how to create the perfect storage and server foundation for your environment.