By Phyllis Schneck2017-12-26T13:15:00
Everybody suffers a data breach, eventually. Here are some helpful tips to prepare an emergency response plan in advance.
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2018-02-13T09:30:00Z By Joe Mont
As a cyber-security tool, companies are turning to outsiders to hunt down software and security flaws. The concern is that bug bounties may become excessive or reward illegal activity.
2026-02-02T12:32:00Z By Ashwathama Rajendran CW guest columnist
Generative AI (GenAI) has moved rapidly from experimentation into day-to-day use across many organizations. Over the past year, teams have shifted from exploratory pilots to relying on these tools for core activities such as contract analysis, research, and software development.
2026-01-16T20:32:00Z By Oscar Gonzalez
The U.S. Federal Trade Commission finalized its order against General Motors and its OnStar subsidiary over the improper usage of geolocation and driving behavior data of drivers.
Site powered by Webvision Cloud