Latest Posts › Data Protection

Share:

Cyberthreats and K-12: EdTech Third Party Risk Management Checklist

K-12 school districts across the country continue to be targeted by threat actors looking to steal sensitive personal information. Examples of this can be seen in the recent incidents affecting the Pearland Independent School...more

Biometric Authentication: The Good, the Bad, and the Ugly

TV and movies introduced biometric identification as a futuristic concept ages ago. Security on Star Trek was cutting edge with voice ID making sure the right personnel were in command of the Enterprise. Facial recognition,...more

2 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide