Deceiving the enemy into believing one is stronger than one actually is, manipulating them into taking self-defeating actions or tricking them into believing the costs of a military raid outweigh the spoils of victory, are tactics repeatedly used in warfare throughout history. By Carolyn Crandall, Chief Deception Officer at Attivo Networks.
Read MoreBy Sharad Patel, data privacy expert, PA Consulting.
Read MoreBy Sion Lewis, VP of EMEA at LogMeIn.
Read MoreBy Ken Mortensen, Data Protection Officer, InterSystems.
Read MoreThere are three key components when we talk about the concept of privacy: Laws, customs and expectations. The importance of each part of this trifecta will vary across geographic regions, generations, and groups. But in order to meet these diverse expectations, companies processing personal information need to offer their customers regional solutions. Cue data residency. By Peter Day, Head of Privacy and Security at Mixpanel.
Read MoreThe adoption of cloud computing by businesses is progressing at an incredible rate. The cloud allows organizations to decrease their operating expenses by allowing them to outsource their infrastructure needs to cloud service providers (CSPs). The competitive market for CSPs has also driven them to develop optimized offerings for different use cases, allowing organizations to choose best-of-breed solutions for each of their business needs. By Patrick Vernon, technology writer.
Read More