Searched for: "authentication and privacy"
- Security (538)
- Mobility (186)
- Cloud (92)
- Networking (76)
- Data Management (27)
- Software (25)
- Developer (17)
- Collaboration (10)
- Enterprise Software (10)
- Cxo (8)
- Hardware (8)
- Social Enterprise (8)
- Big Data (7)
- Apple (6)
- Microsoft (6)
- Project Management (6)
- Virtualization (5)
- Data Centers (4)
- Google (4)
- Open Source (3)
- Storage (3)
- After Hours (2)
- Banking (1)
- Printers (1)
- Start-Ups (1)
About 1061 results for "authentication and privacy"
Behavior profiling will be a game changer in cybersecurity. If you don't want to be profiled, read how the Chrome extension KeyboardPrivacy works.
Cortana is the name of the personal assistant app in Microsoft Windows 10. Mark Kaelin shows you how to turn it on and off.
While SSL/TLS provides privacy and authentication, it also creates a blind spot for enterprise security. Cybercriminals can use SSL to hide their exploits from an organization’s s...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent among sensor nodes. Keys for encryption and authentication pur...
Conflicted much, Apple? Safari, iAd, and how Apple's expanding mission are driving conflicting priorities
Apple wants to do what's right for customers, but an expanding vision is leading to conflicts. Matt Asay explains.
Google has finally introduced a user-friendly means of taking control of account privacy. Jack Wallen thinks the Google Privacy Checkup should go a long way to ease the Fear Uncert...
Securing personal privacy and deterring identity theft are national priorities. Biometrics, an emerging set of technologies, provides an effective solution. Foremost examples of ar...
It has been widely observed that the concept of cloud computing has become one of major theory in the world of IT industry. It involves storing the user's data to be able to use th...
In the present time, due to the rapid growth of digital communication and multimedia application, security becomes an important issue of communication, storage and transmission of ...
Security in the cloud is the top most concern. To achieve trust and preserve the privacy of data stored in third-party cloud storage has emerged as a key research area. To achieve ...