Filters

Create Learner Persona
 
553 words • advanced • 3 years ago
it
"This post was authored by Joseph Sirosh, Corporate Vice President of the Data Group at Microsoft. Most data breaches involve the theft of critical data such as social security or credit card numbers. What if you could store these sensitive data eleme..."

   VIEW / PRINT WORKSHEET

 
788 words • advanced • 3 years, 4 months ago
it
"Google has rolled out a security servicefor its business customers that could put a serious downer on the UK governments plans to increase law enforcements surveillance powers. The servicewas revealed by Google product manager Leonard Law in a blog p..."
agencyamountbasisbetaclaimcomputingdatadatumdealeconomyencryptencryptionenforcementforcegloballawmanagementnetworkprimeprocessproductscramblesecurityserverservicesourcesurveillancetechnologyunlockvast

   VIEW / PRINT WORKSHEET

 
1271 words • advanced • 2 years, 9 months ago
business
"Thomson ReutersSilicon Valleys leading companies including Facebook, Google and Snapchat are working on their own increased privacy technology as Apple fights the US government over encryption, the Guardian has learned. The projects could antagoniz..."
accountauthorityavailabilitybriefchiefcontentcourtdeclineearliereffortencryptencryptionexecutivefederalfounderindicatelackmajormarketingopinionprocessreportsecuresecurityservicesourcetaptechnologytooluser

   VIEW / PRINT WORKSHEET

 
793 words • advanced • 3 years, 1 month ago
it, business
"SAN JOSE, Calif. , Oct. 29, 2015 /PRNewswire/ -- Vormetric, a leader in enterprise data security for physical, virtual, big data and cloud environments, today announced in conjunction with Wakefield the results of its survey about the types of accou..."
combineconcernconductconfidencecontentcontrolcreditdatadatumdetailedeffectiveencryptensureexpresslackmanagementnetworkpasswordpercentpopulationpotentialprotectpublicquotareliablerepresentresourcesecuritysensitivevary

   VIEW / PRINT WORKSHEET

 
573 words • advanced • 2 years, 9 months ago
business
"1 March 2016 09:30 Kingston Details Plans for IronKey's Future • Existing IronKey Customers Will Have Access to Kingston’s World-Class Sales and Technical Support • Announces Sale of HDD Division to DataLocker (Please click here for images) ..."

   VIEW / PRINT WORKSHEET

 
780 words • advanced • 3 years, 4 months ago
it
"Gary Zeune @bigfoot.com A. Microsoft's engineers built a whiteboard feature to permit drawn annotations into a running PowerPoint presentation, and then they tried to cover up its existence. Fire up one of your presentations; while it is running, t..."
accessbulletincompressconcerndatadatumdeletedesktopencryptencryptionentireequipmentinputinvestmentnovelpasswordpermitpolarprocesspurchasereplaceretrievesecuresensitivesnailstufftechniqueuservirtualwhiteboard

   VIEW / PRINT WORKSHEET

 
701 words • advanced • 2 years, 9 months ago
business
"According to recent forecasts by Canalys, over 1.5 billion smartphones will ship in 2016. Despite growing worldwide sales and the increasing popularity of these devices, vendors are not adequately addressing security and privacy concerns. The ongoin..."

   VIEW / PRINT WORKSHEET

 
973 words • advanced • 2 years, 8 months ago
business
"WhatsApp brings end-to-end encryption to all users This story was delivered to BI Intelligence MobileIndustry Insidersubscribers. To learn more and subscribe, please click here. WhatsApp, the worlds most popular chat app,announcedTuesdaythat it now s..."
all-timeannualattackauthoritycommercialcoveragecyberdeviceencryptionend-to-endexamineexposurefactorfullygrowthinsurancemeasureobstacleopportunityoverallovercomepotentialpremiumraterisksectorsecuresupporttechuser

   VIEW / PRINT WORKSHEET

 
600 words • intermediate • 3 years, 4 months ago
business
"Many foreign governments, including friendly countries allied with the United States, have large programs to collect economic, political and military intelligence by intercepting U.S. communications.  Most U.S. long distance telephone and fax commu..."

   VIEW / PRINT WORKSHEET

 
843 words • advanced • 2 years, 9 months ago
business
"BI Intelligence This story was delivered to BI Intelligence MobileIndustry Insidersubscribers. To learn more and subscribe, please click here. Some of the world's leading tech companies are pushing towardincreased security as Apple's war with the FBI..."
all-timeannualcommercialcoveragecyberencryptencryptionexamineexposurefactorfullygrowthinsuranceinsurerleadmeasurenetworkobstacleopportunityoverallovercomepotentialpremiumratereportrisksectorsecurityservicetech

   VIEW / PRINT WORKSHEET

 
383 words • intermediate • 2 years, 6 months ago
it
"Security researcher Randy Westergren has identified a weakness in Verizon's security tools, which leaves customer email data exposed to potential hackers. Verizon has worked hard to address some of the issues, yet emails are still without encryption ..."
accountcampaigncontributedatadatabasedesigneasieremailsemployeeencryptionflawglobalidentifylaunchmanagementnetworkpolicypotentialproductrevealserverservicesharingsteptechvulnerableweakness

   VIEW / PRINT WORKSHEET

 
632 words • advanced • 3 years ago
it, business
"As data becomes the center of digital business, your organization’s ability to secure data is crucial for compliance and confidentiality. But data security is so important that it can also be a competitive differentiator. Indeed, Forrester Research r..."

   VIEW / PRINT WORKSHEET

 
560 words • advanced • 2 years, 6 months ago
business
"Web References (22 Total References) Burkhard Wiegel , Managing ... www.kecri.org [cached] Burkhard Wiegel , Managing Director of Zertificon Solutions GmbH . Z1 SecureMail Gateway was developed in ... www.vigilance-securitymagazine.com [cached] ..."

   VIEW / PRINT WORKSHEET

 
471 words • advanced • 3 years, 2 months ago
it
"Search VSM: Advanced The Full Metal Data Lake is the first commercially available data lake as a service offering in the market, recently announced by big data focused cloud provider Bigstep. LONDON (PRWEB) September 30, 2015 Priced at just £0.01..."

   VIEW / PRINT WORKSHEET

 
1185 words • advanced • 2 years, 12 months ago
it
"Data leaks happen, and sometimes, no matter what you do, they are inevitable. That said, you should always do what you can to protect and secure your interests and, more importantly, your sensitive and personal information. When it comes to managing ..."
accessactionadditionarticleauthoritycompilecontaindatadatumdealdifferentlyemployeeencryptionhardwareinstallinternallossmanagementmeasuremethodnetworkoutgoingpreventprocessprotectpublishsecuresecuritytreatwayside

   VIEW / PRINT WORKSHEET

 
251 words • advanced • 3 years, 4 months ago
business
"A new messaging service backed by some of the biggest names on Wall Street is attracting scrutiny from New York's regulators. The New York State Department of Financial Services is interested in the privacy features that lie at the heart ofSymphony C..."
appealattractchiefclientcolludeconcernearlieremailsencryptexecutiveinstantinterestprivacypublicationrateservicetraderunlock

   VIEW / PRINT WORKSHEET

 
860 words • advanced • 2 years, 4 months ago
it
"shutterstockThere is an escalating technological arms race underway between governments and hacktivists. As governments step up their surveillance, the hacktivists find new ways to subvert it. This cat and mouse game has been described as a crypto wa..."

   VIEW / PRINT WORKSHEET

 
1056 words • advanced • 2 years, 5 months ago
it, business
"Two facts: Your small business probably already is using the cloud, and your data is dangerously close to being leaked, stolen or vandalized.   Most businesses are taking advantage of the cloud or working on it. Roughly 74 percent of all businesse..."
accessadditionalchancechiefcontinuitydatadatumdetailedemployeeencryptionestimateexamineexpertexposurefailurefirewallfirmfocusmaintainmeasureofficerprocessreduceresourceresponsiblerisksecuresecurityserviceuser

   VIEW / PRINT WORKSHEET

"A recent survey [PDF] of 5,750 consumers in the U.S., U.K., Australia, Brazil, France, Germany and Japan has found that 64 percent of respondents said they're unlikely to shop or do business again with a company that experienced a breach in which fin..."

   VIEW / PRINT WORKSHEET

 
547 words • advanced • 2 years, 9 months ago
sales, business
"We also have more stories about: (click the phrases to see a list) SAN FRANCISCO — Apple will hold its spring product launch on March 21, one day before it squares off with federal prosecutors over the government's demand for help unlocking an enc..."
additionalanalystauthorityboostdemandencryptioneventexamineexecutiveexpectfederalgovernmentheadquartersipadiphoneiphonesletlocateloopmagistratemeasureprecedeproductreporterreverserivalsaletabletupgradevulnerable

   VIEW / PRINT WORKSHEET