Category: computer tech
How cognitive and robotic automation play in SecOps
17 Jul, 2017The prevalence of automation is everywhere in our modern, tech-first culture and continuously on the rise — with good reason. …
Microservices offer speed and flexibility, but at a price
22 Mar, 2017Microservices are the latest evolution of services-oriented architecture, where an application is built out of many independent pieces all working …
How data breaches are discovered
7 Feb, 2017While the laws dealing with cybersecurity notifications vary by state, there’s general agreement among organizations that they ought to notify …
What you need to know about GDPR
27 Nov, 2016The concept of data protection has been around for many years, since the UK first implemented a Data Protection Act …
Data governance for each step in data’s journey –
25 Jul, 2016Data governance is a critical yet challenging business process in a world where data volumes, types and uses are rapidly …
FBI wants email privacy act to allow warrantless access to browsing histories
17 Jul, 2016Fixing a “typo” in a law governing domestic surveillance is the top priority for the bureau this year, FBI Director …
Evaluating the privacy properties of telephone metadata
17 Jul, 2016Evaluating the privacy properties of telephone metadata aSecurity Laboratory, Department of Computer Science, Stanford University, Stanford, CA 94305; bStanford Law …