E-mail:
Password:
Register | Help

Postings

17 publications found:

Time to re-think our security process   (2016-07-04)
Data centric security key to cloud and digital business   (2016-03-22)
I think we need to prepare better against cyber attacks   (2016-03-11)
Where is my data?   (2016-02-27)
The Landscape Is Changing in the Security Technology Industry   (2015-06-17)
Organizations Grapple With Security Talent Shortage   (2015-06-17)
Security compliance is still a corporate headache   (2015-06-15)
TARGET BREACH: Encrypted PIN data stolen too?   (2013-12-27)
ISACA - How Innovation can Bridge the Gap between Privacy and Regulations   (2013-11-30)
Cyber Security Expert Suggests Data Encryption to Protect Your Privacy   (2013-11-26)
I'm speaking on a panel about How to securely adopt cloud at CISO in Mumbai on Nov 14   (2013-11-14)
Bridging the gap between privacy and big data (slides)   (2013-09-10)
The Gap Between Privacy, Security, Compliance, Regulations and Big Data   (2013-09-05)
Cloud computing: India can become a global hub   (2013-08-22)
California Attorney General issues data breach report, will focus future enforcement on unencrypted data   (2013-07-20)
National Data Breach Notifications Would Replace 'Patchwork' of State Statutes   (2013-07-19)
U.S. power companies under frequent cyber attack   (2013-05-28)

Page 1

Categories

Security Protect Ransomware Attacks Data Cloud ISSA pandemic privacy encryption tokenization hipaa QA SA Quality Assurance Security Assurance Waterfall AppDev Agile Development DataOps DevOps Compliance NIST PCI DSS Data. Privacy GDPR CCPA Machine Learning AI PII PI Data Discovery SC Magazine BigID Discovery Trustwave FFIEC WInfosecurity ISACA dataops nist standards rsac RSAC 2020 coronavirus blockchain bitcoin databases breaches PCI HITECH RSA • Breaches cyber attack cyber security cyber threat data breach data protection data security BlindSpots NYC Oracle NYOUG siem linkedin blind spots ulf mattsson DSS CSA Gartner Ponemon IBM verizon big data IoT Business Alanta hadoop masking Protection Strategy pci. hipaa regulations Healthcare tokenzation masking Trends Data Protection Strategy brighttal FS-ISAC monitoring audit Cybersecurity ulfmattsson privace cio ciso Data-Centric Digital Business New York City Analytics risk attack breach Justice Department Charges Iranian Hackers Cyberattack Dam power grid C-suite itproportal crime Execs Software Silicon Valley greenwichtime
Showing 50 most recent tags.
View all