Never Really Gone: How to Protect Deleted Data From Hackers

techopedia.com – It’s a brave new world in this digital era, with more data stored electronically and flowing across the internet than – not too long ago – it would be possible to consume in several lifetimes. For mo…

Tweeted by @j0emccray https://twitter.com/j0emccray/status/982083000988028928

Read More

Say Goodbye To The Credit Card Signature

forbes.com – You’ve done this for as long as you’ve had a credit card. But times they are a-changin’. Now that April has dawned, you will likely no longer need to sign for purchases when paying with your credit c…

Tweeted by @AnonBinary https://twitter.com/AnonBinary/status/982094974241124352

Read More

Sensitive Data Protection Processes-A Key to IT Security

consulting-services.enterprisesecuritymag.com – One of the common mistakes organizations make is to focus on the technologies rather than protecting the organization’s sensitive data. Certainly, protecting devices is a necessary task but it’s the …

Tweeted by @margwilli1 https://twitter.com/margwilli1/status/982124659142348801

Read More

Programme

jisc.ac.uk – Chair: John Chapman, head of security operations centre, Jisc. Speaker: Simon Wilson, CTO Aruba UK and Ireland. For the majority of students, the smartphone is the centre of their universe. It is the…

Tweeted by @ImayonTweets https://twitter.com/ImayonTweets/status/982131498043113474

Read More