Tokenization is emerging as a cornerstone of modern data security, helping businesses separate the value of their data from its risk. During this VB in Conversation, Ravi Raghu, president, Capital One ...
According to recent studies, 80% of businesses are likely to adopt generative AI (GenAI) in some form, yet less than 50% feel prepared to manage the associated cybersecurity risks. This gap highlights ...
Back in 2006, British mathematician Clive Humby stated that data was the new oil. Like oil, data isn’t useful in its raw state and must be refined, processed, and distributed to deliver value. Nearly ...
A sign marks the location of the General Services Administration headquarters building on Jan. 29, 2025, in Washington, DC. (Photo by J. David Ake/Getty Images) Eight years since its launch, Login.gov ...
User data protection is a universal concern for businesses across all industries. In the digital age, personal data is a valuable asset, and its compromise can lead to severe financial and ...
A week rarely goes by without a major data security breach. Recent news includes a breach impacting an energy company’s 8 million customers, another compromising the information on 450,000 current and ...
Even in an area of cybersecurity as essential as data protection, the stakes continue to climb higher in 2025. The pressures have mounted both from the intensification of data theft and extortion ...
In a sign of how pervasive data sharing has become, businesses may face challenges complying with a new government rule restricting data use outside the US. The US Department of Justice's (DoJ) Data ...
NTT Research’s new Zero Trust Data Security (ZTDS) Suite, powered by attribute-based encryption (ABE), provides protection at the data level, addressing key challenges associated with Zero Trust ...
From private information retrieval to federated learning, new approaches to securing information are not only resulting in practical data security solutions but also ways of rethinking data ...
From vendors offering identity and data security to providers of security service edge, here’s a look at 20 key companies in identity, access and data security. If the growth of the identity and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results