In an interview with Info-Tech analysts, privacy expert Dr. Ann Cavoukian explains why Air Canada's recent mandatory temperature check policy to screen for COVID-19 should...
|
|
PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor. Thus, allowing such data...
|
|
IT must quickly identify the must-dos to allow a safe return to the office. During this webinar we will go through how to build a prioritized roadmap for safe reopening of...
|
|
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with...
|
|
“Connected reporting capabilities, control testing, real-time collaboration, cloud-based access, stringent security measure and permissions controls” are considered the...
|
|
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at...
|
|
As the post-pandemic landscape begins to take shape, ensure that IT can effectively prepare and support your employees as they move back into the office. Once the office...
|
|
As the post-pandemic landscape begins to take shape, ensure that IT can effectively prepare and support your employees as they return to the office.
|
|
As the post-pandemic landscape begins to take shape, ensure that IT can effectively prepare and support your employees as they return to the office.
|
|
Identify the new risk landscape and risk tolerance for your organization in a post-pandemic world. Determine how this may impact the second wave of pandemic transition tasks.
|
|