Remove program dr-technology-trends
article thumbnail

Stronger Together: Join Thales & Imperva at RSA Conference 2024 Where the World Talks Security

Thales Cloud Protection & Licensing

The path forward demands technological expertise and a profound understanding of the shifting dynamics of power and the dangers in the digital age. It will explain how an approach to a quantum-safe program of work and activities can keep customers and systems safe. You can register HERE.

article thumbnail

Data Protection Day 2024: In Privacy We Trust

BH Consulting

In the context of privacy program leadership, trust plays a particularly important role. Leaders who are trusted by employees, customers, and other stakeholders are more likely to be able to effectively implement privacy programs that protect data while also meeting organizational goals, and complying with regulations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity threats: what awaits us in 2023?

SecureList

Dr. Dennis-Kenji Kipker (the University of Bremen; European Academy for Freedom of Information and Data Protection (EAID)), Arthur Laudrain (The Hague Centre for Strategic Studies), Stefan Soesanto (The Center for Security Studies (CSS) at ETH Zurich) for their scientific and profound contribution. Also, we’d like to thank Prof.

article thumbnail

The state of stalkerware in 2020

SecureList

In terms of geographic spread, we see a largely consistent trend emerging: Russia, Brazil, and the United States of America (USA) remain the most affected countries globally, and they are the three leading countries in 2020. Technology has enabled people to connect more than ever before. Introduction and methodology.

Mobile 80
article thumbnail

Best Privileged Access Management (PAM) Software for 2022

eSecurity Planet

PAM security tools leverage powerful automation capabilities and user-friendly features to build just-in-time (JIT) privileged access programs and zero trust security frameworks. As this trend grows, tools like PAM that enable this kind of security will become more important. See our picks for the best zero trust security tools.

Software 137
article thumbnail

CISSPs from Around the Globe: An Interview with Dr. Christine Izuakor

CyberSecurity Insiders

In this installment, we talk to influential trailblazer Dr. Christine Izuakor. program, I became a part-time professor. program, you find one super, super-focused area, and then you dig really deep into that. program was focused more on security engineering, and how to solve very specific problems.

CISO 111
article thumbnail

CISSPs from Around the Globe: An Interview with Dr. Christina Izuakor

CyberSecurity Insiders

In this installment, we talk to influential trailblazer Dr. Christine Izuakor. program, I became a part-time professor. program, you find one super, super-focused area, and then you dig really deep into that. program was focused more on security engineering, and how to solve very specific problems.

CISO 52