The healthcare industry is in the midst of rapid technological change. As new devices and cloud applications allow providers ...
Israeli cybersecurity firm Check Point rejected Monday a hacker's assertion that he stole "highly sensitive" information ...
British law enforcement agencies are ill-equipped to tackle artificial intelligence-enabled cybercrime, a report by The Alan ...
Digital-only banks promise speed and sleek digital experiences but are not the best places to handle scam victims. Without ...
With often leaner compliance teams and more innovative financial products, emerging financial service firms have in ...
In her role as technology and privacy law specialist, Lisa R. Lifshitz has consulted on contractual discussions for cloud user-organizations of various complexities. As co-editor of the recent book ...
This workshop will expand on many of these areas and present practical and proven approaches many institutions have adopted in order to comply with Section 501(b) of GLBA and Section 216 of Fair and ...
Hackers may have a reputation for wizardry, but researchers say two of their top tactics are entirely prosaic: exploiting known vulnerabilities in outdated networking gear to gain initial access, as ...
Alvin Chiang is an Enterprise Solutions Engineer with over 10 years of experience in safeguarding critical information systems and mitigating security risks. With expertise in identity governance, ...