Facebook scientists have proposed using "radioactive data" watermarks to identify when online images get used to train neural networks. The proposal appears to be aimed at the rise of big data startups, such as Clearview AI, that are scraping publicly available photographs to create facial recognition tools.
The Reserve Bank of India has decided to allow all banks to use remote video-based "know your customer" authentication for onboarding new clients. But some observers say many Indian banks may prove reluctant to use video KYC because they lack the necessary technology and new customers lack smartphones.
About 3000 Indian customers' credentials were exposed in the OnePlus data breach, where hackers accessed customer data. CERT-In has issued an advisory on the breach while cautioning users about the influx of spam and phishing email owing to the incident.
The Periodic Table of Data Protection maps the data protection
modernization journey of enterprises and explains the complexities of
data protection in an organized and structural format. IT pros and
business IT users can leverage on it to assess gaps in protecting their
data capital in the areas of backup and...
Welcome to The Periodic Table of Enterprise Data Protection. It maps the data protection modernization
journey of enterprises and serves to explain the complexities of the subject matter in an organized and
structural format. It also provides a stark comparison between traditional data protection and the various use...
Multifactor authentication is gaining traction - but it also is causing additional user friction when deployed poorly. Corey Nachreiner and Marc Laliberte of WatchGuard Technologies discuss how best to deploy and administer MFA.
With the goal of becoming an international university XJTLU needed to ensure that their website was high performing and available for users anywhere in the world. However, with infrastructure focused on campus, access to XJTLU's site was intermittent and slow for off campus users. This poor performance was magnified...
Accessibility is often the last thing to be considered in the digital development process. In the physical world, accessibility is entrenched into planning, development and execution - so why isn't it in the digital world?
Over the years, the UTM and SWG appliance industries have grown
into what is today a $4.9 billion dollar a year business servicing the
millions of small to medium businesses that lack the security experts
and larger budgets available in the enterprise space.
Unfortunately, most SMB owners are unaware that the...
The prices for specific types of cybercriminal tools on darknet sites continue to rise, according to a recent analysis by security firm Flashpoint. Payment card and passport data remain the most sought-after commodities on these forums, research shows.
Although a challenge, comprehensive data protection is possible and key to keeping
your company's most crucial assets protected in both physical and virtual environments.
An independent analysis of global organisations and their data protection readiness
reveals that a vast majority nearly 82% must transform their...
Data is transforming the way we live and work and has become a catalyst for innovation in our economy. IDC predicts that 50% of global GDP will be digitalised by 2021. Data powers digital transformation. Those organisations who can harness their data capital are poised to succeed.
Wealth in the form of value...
As organizations move increasing numbers of workloads
to distributed, multicloud environments and adopt
connectivity-dependent trends such as the Internet of
Things, the simpler networks of yesterday have steadily
morphed into something considerably more complex. It's
this growing complexity that is the ultimate...