Searched for: "authentication and privacy"
- Security (623)
- Mobility (187)
- Cloud (97)
- Networking (77)
- Data Management (27)
- Software (25)
- Developer (17)
- Enterprise Software (11)
- Big Data (8)
- Collaboration (8)
- Cxo (8)
- Hardware (8)
- Social Enterprise (8)
- Apple (6)
- Microsoft (6)
- Project Management (5)
- Virtualization (5)
- Data Centers (4)
- Google (4)
- Open Source (3)
- Storage (3)
- After Hours (2)
- Banking (1)
- Printers (1)
- Start-Ups (1)
About 1152 results for "authentication and privacy"
If you shop on Amazon, for your business or personal needs, you need to enable two step authentication immediately.
Mobile devices are the new computing fabric in the enterprise. They bring great opportunity for new innovation and productivity in business processes, however, they also bring new ...
To achieve its goal of getting one billion people onto Windows 10, Microsoft is getting more forceful in how it pushes Windows 7 and 8.1 users towards its new OS.
As the Turing Phone nears its launch the device's makers reveal their plans to push forward smartphone capabilities and battery life.
Encrypting data on client-side before uploading it to cloud storage is essential for protecting users' privacy. However client-side encryption is at odds with the standard practice...
When considering a cloud deployment, remaining compliant is paramount. Here are some best practices for the cloud in three industries known for stringent compliance.
Design and Implementation of Hop to Hop Message Authentication and Source Privacy in Wireless Sensor Networks
Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in Wireless Sensor Networks (WSNs). For this reason, man...
Upgrading your iOS device? Learn how to properly wipe all personal data from your current device before selling or giving it away to protect it from data loss.
With the emergence of the voluminous amount of data in the recent past, there has been an increased potential for mining this data to obtain fruitful information, leading to the da...
Since conventional password schemes are vulnerable to shoulder surfing, many shoulder surfing resistant graphical password schemes have been proposed. However, as most users are mo...