App developers are ignoring laws and guidelines regulating data protection measures aimed at minors, putting their monetization plans in jeopardy and risking user trust. Read More HERE
Consolidating identity management on one platform gives organizations real-time access management for all identities on hybrid and multicloud installations. (First of a two-part series.)Read More HERE
By developing new tools to defend against adversarial AI, companies can help ensure that artificial intelligence is developed and used in a responsible and safe manner.Read More HERE
In next-gen, credential-harvesting attacks, phishing emails use cloud services and are free from the typical bad grammar or typos they’ve traditionally used (and which users have learned to spot).Read More HERE
In-person conversations are a productive way to understand the state of the industry and learn new techniques. Take advantage of peers’ experience, compare notes, and boost your skill set. Read More HERE