E-mail:
Password:
Register | Help

Postings

37 publications found:

Data-centric security key to cloud and digital business   (2016-04-18)
Data-Centric Security - Cloud and Digital Business in New York City   (2016-04-15)
What keeps you up at night?   (2016-02-24)
Many Companies Still Procrastinating When It Comes To Cybersecurity   (2016-02-17)
Businesses believe compliance is effective at stopping data breaches   (2016-01-23)
Breaches will continue until morale improves   (2016-01-22)
Securities and Exchange Commission gets tough on cyber security   (2016-01-17)
Hyatt says data breach started in August   (2016-01-17)
O.C. Watchdog: Healthcare data breaches spike in California   (2016-01-16)
National data breach compromises voter information   (2016-01-02)
Safe and secure in the cloud   (2015-12-09)
How Smart Businesses Keep Their Cloud Data From Falling Into the Wrong Hands   (2015-12-09)
Security Worries Hamper Adoption of Cloud Technology   (2015-12-08)
Encrypting your data: Why your business should be using encryption   (2015-10-22)
Trump Hotels Hacked—for a Year - Infosecurity Magazine   (2015-10-07)
Experian Breach: Lessons Learned - BankInfoSecurity   (2015-10-06)
Security risks increase as cloud data centers change   (2015-10-05)
Experian T-Mobile hack shows encryption no 'panacea' for security, warns Tor co-founder   (2015-10-05)
Coding In The Cloud Era Demands A Structural Rethink To Bake In Security And Privacy   (2015-09-30)
Are cloud-based data warehousing and business analytics worth the risk?   (2015-09-23)
Tips To Avoid the Disastrous Retail Data Breach   (2015-09-23)
Investing in a Data Lake? Shore up the Big Data Gateway   (2015-09-22)
Presentation at NYOUG Fall General Meeting - Oracle - Data-Centric Security Key to Cloud and Digital Business   (2015-09-18)
The 4 Factors of Planning a Cloud Deployment   (2015-09-04)
U.S. Court Affirms FTC Authority to Enforce Data Breach Rules   (2015-09-03)

Page 1 2 >

Categories

blockchain bitcoin encryption tokenization databases breaches compliance PCI HIPAA HITECH RSA ISSA • Breaches cyber attack cyber security cyber threat data breach data protection data security PCI DSS Data Security BlindSpots NYC Oracle NYOUG siem linkedin data discovery PII blind spots ulf mattsson ISACA DSS NIST CSA Gartner Ponemon IBM verizon big data IoT Business Alanta hadoop cloud privacy masking Protection Strategy pci. hipaa regulations discovery Healthcare tokenzation masking Trends Data Protection Strategy brighttal RSAC FS-ISAC monitoring audit Cybersecurity ulfmattsson privace cio ciso Data-Centric Digital Business New York City Analytics risk attack breach Justice Department Charges Iranian Hackers Cyberattack Dam power grid C-suite itproportal crime Execs Software Silicon Valley greenwichtime IOTcomputerweekly RSA 2016 RSA Conference DoJ Apple Redmondmag RSAC2016 nerc power plants obama energy atacks power systems rsa conference govtech government RSA-2016 States Digital-Age safeguarding hacks hack-worthy targets InformationWeek Chief Data Officer CDO InformationWeek Gartner Target ITPortal SEC financial services malware Internet of Things health EU regulators EU-U.S. data transfers data. breach compromises voter krqe Cyber IDG zdnet medical mentization keys McAfee Dark Reading cross border Microsoft Aberdeen Amazon Microsoft SANS SMB internet wsj deloitte SAfe Harbor ruled invalid European Court of Justice ECJ AWS eWeek Hortonworks BYOK Forbes anonymize se-identify DCAP policy gateway EMV Visa Mastercard monitor Government cars europe Safe Harbour Threat bankinfosecurity.com re-personalise anonymous data Analysis Multidimensional Information Governance legislation InformationWeek #8203 zd.net EU perimeter Trump Hotels Hacked Infosecurity Magazine T-Mobile Experian Customer Data hacks tokenization BankInfoSecurity data center tokenization Tor hack retail data-lake BigData database Exadata Cloud storage stolen Lloyds customer account lost encrypted medical record Computerworld ftc wyndham kerberos VMware virtualization ell CSO Ashley Madison CEO tokrnization forbes sue appeals court NSA quantum intel Privacy skills Google Dropbox man-in-the-cloud attacks Carphone TalkTalk Warehouse gateways regulatory concerns SaaS insider JPMorgan HSBC cyber-security secure private cloud health care DHS Enterprise IT Operations Big-Data UK finance banks Data centric IP payment workforce jobs Symantec OPM smartwatches SAP biometrics Key Management Concern Businesses Identity theft block attack Feds firewall network Trump. hotel China benchmark helthcare CXO COO forrester Physical security Financial Hewlett-Packard files collaboration FireEye SC Magazine Auto Cyberattacks talent mature IT operation DNA exposed SSNs personnel records fed workers Securing Debacle box Check Point IRS Heartland Snowden social security numbers russia FBI hybrid chip technology protect card Bracket insurance sally Quality board Quality Innovation research impersonating data breaches IT careers Rx Merchants PCI 3.1 computers Merchant Coca-Cola Mobility Premera hhs Mandarin Oriental Hotel Credit Card Breach antivirus Hitachi Hortonworks Anthem Governing Health insurer Access Records Customers Trusted patches brighttalk US website personal outside human errors JP Morgan Chase Azure issue Shadow IT hosted US Federal Trade Commission managing security Privacy Value of Data Cloud. security Secrets spies 2015 Webroot Predictions Sony asia Xbox PlayStation credit cards fraud CYBERCRIMINALS. banks Response Mistakes US lawmaker foreign intrigue star wattage lawmaker boardroom Staples hacking North Korea JP Morgan Chase bank Hollywood ETF Cyber-Security Spending Data destruction endpoint intelligence user behavior national crisis KPMG INTELLECTUAL THEFT WORRIES nation-state war Bloomberg Mandiant IDC New Zealand always-on Study Cyber Attacks law govern Home Depot big data data Information mobile Monetization Trust cybercrime trust budget Bebe Computing PlayStation Servers Stolen Dat Personal Information Employees movies leaked CNET Healthcare Data Salaries PYMNTS data flow TOKENS voltage emails Chip and PIN NYT New York Times CTO Cloudera Informatica yahoo cyber crime auditors Race J.P. Morgan Road-Race retailers safe experts increasing decade california Breache Report Analyze POS CYBERCRIMINALS Education Backoff Protect Data Preventing encrypt Virtual Private Corporate Retailer NY Times NYTimes icloud scmagazine council Obama executive order biometric retina password hardware technology transactions Mainframe best practices Kmart Breached SEARS Strata Thought Leader Avatar Teradata QSA Wall Street Think Tank Celebrity photo leaks issues CYBERTHIEVES K-MART DAIRY QUEEN Fidelity Photos Leak MBIA Breach Security Ops Risk Management AtT threats inside NY Metro Conference Cyber Insurance Policies Home Deport Fortune USATODAY ABC CIA PIN Shellshock Bug Heartbleed Android Phones Bash Smartphone VIATOUR TripAdvisor Payment Card Data Home Depots PR problems dwarfed by Target breach Moneywatch: Home Depot data breach NASDAQ Atlanta voltage# PCI-DSS epidemic identity responsible Hack Exposes Lawmakers SSC PCI DSS 3.0 merchants InfraGard ISC2 OWASP Practical Advice Thefts Break HealthCare.gov Victim FT Market watchdog cloud computing CBS NBC CNBC iPhone UCard coordination India Patient Risk. Security security risk health practices Internet of Things CHS Breach. Health Care Illness Researchers steals Gmail online banking TOKEN PAYMENTS standard UPS account Supervalu Avoidable supermarket chains Acquisition breaches P.F. Changs Russian Lesson plan Market billion passwords Shares Cost eBay Forbes audits breachesprofessionalized PF Chang restaurants customer data stolen Saving Practical Advice CRM Salesforce Investigations 2014 Target breach Manufacturing Darkreading Settlement license Protegrity patents Safenet Ingrian EPS Element Payment Services Liaison nuBridges lawsuit Michaels Heartbleed Bug healthcare Canada Cyber threats insurance industry financial institutions APT SP Data Profit Health Data Senate Data Theft Auditor Trustwave Sued Strategies TCO Data privacy regulation offshoring outsourcing Davos Chinese UN Congress testify Neiman Marcus Social Top IT Trends for 2014 pricavy Protecting Privilege data security Ancestry.com eu cross border snowden EY Ernst Young business data worm Vulnerable Encryption Spying information security privacy legislation Cross-Border Off-Shoring Sensitive Data profits adobe Data Security Value advantage Predictive Cyber risk Power utilities companies liability specialists Survival Insecure Cyberworld compromise privacy insider threats Privileged users Data Leaks health insurance Lawmakers In-House Data Thief standards data security TOI timesofindia LulzSec hacker Societe Generale Mumbai COBIT digital currency Perfect Money surveillance financial data databreach enforcement authority Prevention Boards Outsourced NBCNews notification Hospitals Group Practices Payers HR FDA insiders CreditCards Mining PHI Data scientist ColdFusion venture capital privileged account attackers data asecurity challenges solutions My #HIPAA presentation in phi Data Tokenizing Issued and Pending Patents Ulf Mattsson's Blogs Chain-of-Trust SQL Encryption Oracle Encryption DB2 Encryption Intrusion and Data Leakage Prevention Performance and Scalability Database Protection Data and Application Security Regulatory Requirements and Industry Initiatives
View all