How safe is your company's data? Take these simple steps to keep it from falling into the wrong hands.
Faced with an unprecedented threat, federal agencies are looking to lock down the physical compute layer for additional cybersecurity assurance. Alexander Slagg is a freelance writer specializing in ...
As cloud computing becomes more common, businesses have had to contend with the challenge of protecting sensitive data during processing. Confidential computing addresses this by keeping data in use ...
From classification and encryption to employee training and compliance, a strong document security framework is now a legal, operational, and strategic necessity for protecting sensitive data.
How Does Non-Human Identity Management Revolutionize Secrets Security? Is your organization effectively managing its non-human identities (NHIs)? With the growing complexity of interconnected systems ...
NEW YORK--(BUSINESS WIRE)--Altum Strategy Group today released its inaugural U.S. Cybersecurity Leaders Survey, showing that American cybersecurity decision‑makers are heading into 2026 focused on ...
Privacy-enhancing technologies (PETs) can be a significant tool for governments aiming to protect sensitive data, according to a new report from New America’s Open ...
Security: Experts highlight how AI-driven attacks, stricter regulation and fragmented data systems are forcing companies to rethink privacy, resilience and trust.
Tokenization is emerging as a cornerstone of modern data security, helping businesses separate the value of their data from its risk. During this VB in Conversation, Ravi Raghu, president, Capital One ...
Metomic Launches Advanced AI Data Security Solutions to Address Growing Enterprise AI Adoption Risks
LONDON--(BUSINESS WIRE)--Metomic, a leading data security platform, today announced two groundbreaking AI-powered solutions designed to help enterprises safely deploy artificial intelligence tools ...
Handling sensitive patient data is a critical responsibility for organizations involved in clinical trials. To meet regulatory requirements, many rely on SDTM mapping—a process that converts raw ...
Data brokers violate the FTC Act if they collect and sell consumers’ sensitive location and other data without obtaining verifiable user consent. The FTC reached settlements in January with two ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results