Remove Authentication Remove Events Remove Information Security
article thumbnail

Trusted Cyber Collaboration Workshop: A gathering of the leaders in secure collaboration and cyber security 24-26 Sep in DC

CTOvision

TSCP is proud to present the Trusted Cyber Collaboration Workshop, an opportunity for professional information sharing, and a vendor exhibition. Please take a moment to review the growing speaker roster below–you’ll find over two dozen leaders in secure collaboration, and all of them will be speaking this Fall.

Security 258
article thumbnail

My CISM Journey - The True Value of Certifications

CIO Musings

I have worked in cyber security for decades. I have toiled in the trenches, built authentication systems, lived through breaches, sold infosec investments to budget-minded leaders, built cyber security teams, and most importantly led in the cybersecurity area. As they say it is the journey, not the event. Piece of cake.

Study 195
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Want to change the world? ‘Secure’ the Next Killer App in IoT

The Investing Edge

Given the massive amount of data that is being collected today (Merritt says this has grown from terabytes to petabytes daily) how do we keep information secure and who owns it is once it is collected? Events Internet of Things Ascent B2B IT Forum Entrepreneurs events internet of things IoT startups'

Security 119
article thumbnail

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

Cloud infrastructure and mobile applications are still major aspects within the field using project management and technical approaches like SCRUM which employs real-time decision-making processes based on actual events and information. In a computing context, the term security implies cybersecurity. Internet of Things.

article thumbnail

Generative AI: Balancing security with innovation

CIO Business Intelligence

Whether it’s deep fakes or simply more sophisticated phishing attempts, AI is making it easier to steal identities and ramping up the need for more accurate, faster authentication. Visit Discover Technology to learn more about Discover’s approach to security, AI, reliability and more. Misinformation and manipulation of data.

article thumbnail

‘The week has literally exploded’: Tech security startups grapple with SolarWinds fallout

GeekWire

Cybersecurity & Infrastructure Security Agency. The scale and sophistication of the attack are “amazing,” said Michael Hamilton, co-founder and chief information security officer of Seattle startup CI Security. “We probably won’t know the full extent of damage for a while, unfortunately.

Security 144
article thumbnail

Moving beyond usernames and passwords

CIO Business Intelligence

In recent months, you may have noticed an uptick in two-factor and multi-factor authentication prompts, which are being used to verify consumer and business accounts. Implementing multi-factor authentication. Some companies use physical security keys for an additional layer of data protection.