Recent data breach incidents that expose personally identifiable information and biometrics highlight the lack of proper authentication and storage protocols. Organizations need to implement effective storage-based strategies to protect the biometric data collected as a result of authentication. Why is data encryption the solution?
Facial recognition companies are seeing opportunity in their services with the Coronavirus in identifying individuals without the risk of close contact, according to OneZero.
Why is Kilos - a new cybercriminal engine - quickly becoming popular, and what are the threats that security researchers and operations team face with Kilos?
2020 is here and companies that fall under the California Consumer Privacy Act (CCPA) requirements need to take immediate actionable steps now. Non-compliant businesses will not only face hefty fees but potentially adverse impacts to their brand, a loss of customers and negative PR. What are three tips to ensure your enterprise complies with the CCPA?
A new report by LexisNexis® Risk Solutions, Cybercrime Report covering July 2019 through December 2019, reveals how fraud has increasingly become borderless on a global scale.
Instead of blocking hackers, a new cybersecurity defense approach developed by University of Texas at Dallas computer scientists actually welcomes them.
The Cybersecurity and Infrastructure Security Agency’s (CISA) Information and Communications Technology (ICT) Supply Chain Risk Management (SCRM) Task Force approved the creation of a new working group to develop attestation frameworks around various aspects of supply chain risk management best practices.