Tag: States
-
Nevada Ranked as the Riskiest State for Identity Theft
Consumers lost $16.8 billion to identity fraud in 2017, according to Javelin Strategy & Research. A SecureLife analyzed crime data for …
-
Discover the State of Authentication and the Evolving Threat Landscape in this White Paper by OneSpan. Get your copy!
Graham Cluley Security News is sponsored this week by the folks at OneSpan. Thanks to the great team there for their …
-
The Global State of Online Digital Trust
Forty-eight percent of customers drop the products and services of organizations that have had a publicly-disclosed data breach. This is …
-
The Current and Future State of Databases: Per Actian
Emma McGrattan, SVP of Engineering at Actian shared her insights on the current and future state of databases with DZone. Here’s what she …
-
Data Protection Bill Series: Non-consent based processing by State and non-State actors
The Personal Data Protection Bill, 2018, was released by the Justice BN Srikrishna panel on 27 July. Pertaining to that we are doing a …
-
Global State of Digital Trust Survey and Index 2018
Great talking to Mo Rosen, Senior Vice President and General Manager Cybersecurity at CA Technologies about their Global State of Digital …
-
The State of Cybersecurity: A CISO and CTO Dish on AI, Emerging Threats, Crisis Leadership and More
What’s it like to spend time with two renowned leaders in the cybersecurity field? Enlightening, to say the very …
-
Data Protection Bill: Here’s the fine print relating to privacy, State functions
Editor’s Note: This is first of a two-part series on the rebuttals to the supposed misrepresentation of the draft Data Protection Bill, …
-
State Govts. Warned of Malware-Laden CD Sent Via Snail Mail from China
Here’s a timely reminder that email isn’t the only vector for phishing attacks: Several U.S. state and local government agencies have reported receiving strange letters via snail mail …
-
deviceTRUST Contextual Security – Use Case (Conditional Access based on Security State) Video
We show how the status of the security components on the endpoint (firewall, anti-spyware, anti-virus, Windows updates, etc.) can be used …
-
Congressional Report Cites States Most Vulnerable to Election Hacking
With the cyberattacked 2016 elections as prelude and the 2018 mid-term elections looming, the House of Representatives Committee on …
-
State of the SOC? Depends on Who You Ask
Exabeam released its 2018 State of the SOC Report, which revealed that many organizations don’t have the right people and technology to …
●●●