This National Cybersecurity Awareness Month, learn the three digital risk management priorities that are top-of-mind as leaders face increased pressure to secure their businesses, bottom lines and reputations.
What did Johns Hopkins Medicine’s data trust administrator do when faced with the challenge of protecting patient privacy while using records to improve care and facilitate research?
While the Girl Scouts of the USA (GSUSA) continue to sell our favorite thin mints and samoas, its leaders are working to alter the landscape of science, technology and mathematics (STEM) by continuing to promote 70 STEM-specific badges and adding new Coding for Good badges this summer.
The surest way to thrive in the age of digital transformation is to involve security and risk leaders. Whether you seek operational efficiencies, improved customer service, or a modern business model, beware of these eight common types of digital risk spawned from digital transformation initiatives.
For years, researchers have been asking what else they can do to detect real fraud. In the annals of cyber warfare, the ability to use machine learning to detect and thwart threat confronts the very real problem of too many false alarms.
Technology plays a critical role in addressing public safety emergencies, from surveillance cameras to biometric scanners. But it’s the Internet of Things that enables such devices to be connected, allowing for real-time threat monitoring and faster, smarter response tactics that keep the public—and those tasked with protecting them—safe.