In a world gone crazy, you never know when you’re going to be in a situation where you’re under attack, facing a gunman. Col. S.K. Singh, a counterterrorism specialist, gives you an idea of what you’re up against and what you should try and do.
If you’re in banking or the healthcare industry, you almost certainly have a bunch of stringent rules you’re supposed to follow when it comes to transmitting sensitive personal information. But in our experience, many other businesses in the United States, including in the casino, hotel, and retail sectors, are remarkably casual, or perhaps, unaware, about the sharing of PII data, whether on customers or on employees, and that information could cause serious financial, legal and reputational harm.
We live in a real-time economy powered by cloud computing networks and big data. Author, speaker and award-winning CIO, Michael Hugos, explains why the complex adaptive system that is a supply chain needs a responsive cyber “immune system,” much like the human immune system, to protect itself in this dynamic new world.
In a rapidly evolving, technology-driven environment, where the IoT is a way of life, the incoming administration faces a number of new challenges, especially from a security perspective. Biometrica CEO, Wyly Wade, details 5 major challenges ahead.
‘Privacy And Anonymity Through An Independent, Biometric-Driven Universal ID Is The Best Way To Secure Other Systems’
In a detailed conversation, Dr. Pramod Varma, the Chief Architect of Aadhaar, India’s biometrics-linked UID system that has enrolled more than a billion people in under six years, speaks on why it was necessary to have an independent biometrics-linked platform, privacy, tracking, Voter IDs, and more.
The 5 Real World Things You Really Do Have To Keep In Mind To Secure Your Virtual World: Verify Credentials, Have Pinch Point Admission, Validate Vendors, Implement Physical Access Protocols To Devices, and Be Able To Trust Your Staff