- Welcome Guest
- Sign In
The law aims to protect Americans by blocking and prohibiting all transactions from any social media company in, or under the influence of, China, Russia, and several other foreign countries of concern.
Officials charged Joseph Sullivan with working to hide the data breach from U.S. regulators and the Federal Trade Commission, adding his actions attempted to prevent the hackers from being caught.
Scalable cloud-based solutions are widely popular among IT pros these days. The cost, convenience, and reliability of ready-to-use software as a service make this disruptive technology a favorable choice. Still, the market needs some convincing that backing up to the cloud is both a smart and safe t...
We spoke with Bigeye Co-Founder and CEO Kyle Kirwan about how his company’s data sniffing platform brings together data engineers, analysts, scientists, and stakeholders, to build trust in data.
Is your company's data is clean and well managed? Why does that matter anyway? Ataccama VP David Kolinek discusses the challenges and solutions related to the formal management of data assets within an organization.
When designing or architecting a solution to ensure responsible data use, it is important to develop a universal data authorization framework that includes these six key capabilities.
Cloud storage provider Nasuni recently announced a $60 million equity investment by new investor Sixth Street Growth. This is the fourth round of financing for Nasuni over the last five years, during which it has raised a total of $148 million. We spoke with the company's founder and CTO Andres Rodr...
The biggest breach of the period was actually a combination of several cyber smash-and-grab operations over the years that contained 3.2 billion unique email and password combinations from Netflix, LinkedIn and other online outfits.
A survey of 1,050 U.S. adult consumers found that 16 percent of the participants in the research took no action after receiving notice of a data breach affecting their accounts. Information from breached accounts can be used for identity fraud or to make employers vulnerable to cyberattacks, includi...