In her role as technology and privacy law specialist, Lisa R. Lifshitz has consulted on contractual discussions for cloud user-organizations of various complexities. As co-editor of the recent book ...
This workshop will expand on many of these areas and present practical and proven approaches many institutions have adopted in order to comply with Section 501(b) of GLBA and Section 216 of Fair and ...
Alvin Chiang is an Enterprise Solutions Engineer with over 10 years of experience in safeguarding critical information systems and mitigating security risks. With expertise in identity governance, ...
British law enforcement agencies are ill-equipped to tackle artificial intelligence-enabled cybercrime, a report by The Alan ...
Israeli cybersecurity firm Check Point rejected Monday a hacker's assertion that he stole "highly sensitive" information ...
With often leaner compliance teams and more innovative financial products, emerging financial service firms have in ...
Hackers may have a reputation for wizardry, but researchers say two of their top tactics are entirely prosaic: exploiting known vulnerabilities in outdated networking gear to gain initial access, as ...
The healthcare industry is in the midst of rapid technological change. As new devices and cloud applications allow providers ...
Digital-only banks promise speed and sleek digital experiences but are not the best places to handle scam victims. Without ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results