93 Results for:reciprocity
- Sort by:
Mobile Security and Privacy
25 Jul 2017In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity in terms of mathematics. Read More
RSAC16: US works on data access agreement with UK
01 Mar 2016The US is negotiating with the UK to establish a new framework that will permit UK authorities to access electronic communications directly from US companies Read More
Intel Security warns of six social engineering techniques targeting businesses
19 Feb 2015An Intel Security report encourages businesses to address and educate employees on “six levers of influence” used by hackers Read More
How threat actors weaponized Mia Ash for a social media attack
11 Aug 2017Dell SecureWorks researchers detected suspicious activity on social media accounts of Mia Ash. When they dug deeper, they discovered a new, complex social engineering attack. Read More
Implementing a 21st century approach to digital identity
08 Jan 2020The government’s attempts at digital identity have failed – it is time for a new, modern approach Read More
Best Practices for Active Directory forest trusts
01 Nov 2011The more domains you manage, the more you rely on forest trusts. Follow these tips to manage your AD infrastructure – and maintain your sanity. Read More
IBM celebrates 100th birthday as workers send video calling for improved conditions
14 Jun 2011International Business Machines (IBM) is celebrating its 100th birthday, founded as the Computing Tabulating Recording Corporation through a merger of four companies in 1911. Read More
UK intelligence agencies ‘unlawfully’ sharing sensitive personal data, court hears
17 Oct 2017A secret court will decide whether Intelligence agencies are “unlawfully” sharing huge datasets containing sensitive information about the population with industry, government departments and overseas intelligence ... Read More
FISMA Compliance Handbook
14 Apr 2014In this excerpt from chapter 3 of the FISMA Compliance Handbook, author Laura P. Taylor discusses the five methodologies that agencies use as a basis to carry out FISMA compliance. Read More
Facebook’s privacy game – how Zuckerberg backtracked on promises to protect personal data
01 Jul 2019Facebook promised its users privacy then quietly abandoned its promises in pursuit of profits. Now it faces antitrust regulation Read More