Enterprise data privacy management News
January 13, 2017
Consumer privacy took center stage at Federal Trade Commission's PrivacyCon event held in Washington D.C. on Thursday. Senior Executive Editor, Linda Tucci explores how advancements in technology ...
December 16, 2016
News of a 2013 Yahoo breach will likely not be the jolt Americans need to become more cyber-savvy -- and that's scary. Also, Trump meets with tech leaders; FCC chair to resign.
October 07, 2016
An expert panel debates the merits of privacy in a cybercrime world at the Cambridge Cyber Summit. Also in Searchlight: Google's new smartphone and Yahoo scans emails.
September 30, 2016
Organizations look to encryption as a foolproof way of securing cloud information. But making the data unreadable to unauthorized users doesn't protect data from everything.
Enterprise data privacy management Get Started
Bring yourself up to speed with our introductory content
The proliferation of IoT devices has resulted in an upsurge in data-driven marketing, which in turn can fuel data security, privacy and ethics concerns, experts say. Continue Reading
As enterprises expand their mobile footprint, the security risks to their data multiply: an unattended tablet, unsecured Wi-Fi network or malware from a third-party app is all it takes for data loss or a security breach to occur. Protecting just one... Continue Reading
Multisig, also referred to as multi-signature, describes the requirement of obtaining two or more signatures to authorize or execute a transaction. The term often refers to its application within Bitcoin cybercurrency and comparable electronic ... Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Enterprise data privacy management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
CISO responsibilities are both expanding and shifting to other departments. CEB's Jeremy Bergsman sorts out the future state of IS, privacy and the risk ecosystem. Continue Reading
IT leaders are adding more security layers in an effort to protect against mobility threats. What tools are in their portfolios? Continue Reading
There are predictions that the blockchain market will change the nature of business transactions. But how much of that is hype? One analyst weighs in on the topic. Continue Reading
Manage Enterprise data privacy management
Learn to apply best practices and optimize your operations.
Human error remains a threat to data, but privacy advocate Grace Buckler says setting the tone with company culture can offset enterprise information security and privacy risks. Continue Reading
A company known for peddling language-learning CDs charges into the digital future -- and IT is in the vanguard. Continue Reading
Etay Maor, executive security advisor at IBM, discusses the growing ransomware threat and why IoT could be the next ransomware target. Continue Reading
Problem Solve Enterprise data privacy management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this CIO Minute video, CTO Niel Nickolaisen shares his thoughts on mitigating mobile security risks. Identifying the sources of risk is just the first step. Continue Reading
As the use cases for the internet of things continue to expand into various sectors and the benefits of analyzing that data collected from IoT grow, the question of IoT data ownership and access privileges is coming to the fore. But we can't simply ... Continue Reading
Creating a powerful user experience (UX) is the holy grail of mobile app development, according to SearchCIO columnist and former CIO Harvey Koeppel. But the journey there is fraught with obstacles, including managing and designing apps that ... Continue Reading