Searched for: "protecting digital assets"
- Security (35)
- Cxo (15)
- Microsoft (8)
- Networking (7)
- Data Centers (6)
- Enterprise Software (6)
- Hardware (4)
- Storage (4)
- Collaboration (3)
- Developer (3)
- Mobility (3)
- Social Enterprise (3)
- After Hours (2)
- Apple (2)
- Banking (2)
- Cloud (2)
- Data Management (2)
- Innovation (2)
- Tech & Work (2)
- Big Data (1)
- Open Source (1)
- Project Management (1)
- Software (1)
- Virtualization (1)
About 116 results for "protecting digital assets"
Is your company security a bit on the lean side due to a budgetary shortfall? Here are some affordable ways to prop up that weak security and protect your data.
Chroma Fund is a crowdfunding site powered by the blockchain, the same underlying technology that powers Bitcoin. Learn how it's preparing to disrupt startup investing, and much mo...
Today, the very concept of digital identity is under fire. Every week, we read about a new hack, a new attack, a new financial and public relations disaster for a company we previo...
Intel Security has developed the world’s first software-based testing environment for advanced evasion techniques (AETs). With this free security tool, you can test your organizati...
Cybercrime is a range of illegal digital activities to target an individual or an organization in order to cause harm. The term cybercrime applies to a wide range of attack methods...
2014 was the Year of the Data Breach. Nearly 1 million new malware threats were released daily , and 43 percent of companies faced a data breach. In the webisode, Security and P...
Ian J. Kalin, the first chief data officer (CDO) at the Commerce Department, is figuring out how to tie data products and science to a core mission of his agency: enhancing busines...
Naomi Hirabayashi tells TechRepublic about getting young people plugged into social good with a zero-dollar marketing budget.
As the people lives increasingly go digital, data protection has become one of the critical concerns. With data breaches on rise, companies must remain vigilant in safeguarding the...
For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and ...