
Direct assertion of identity based on a physical presence factor
The Board of Governors of the Federal Reserve and the Federal Financial Institution Examination Council…
thedigitaltransformationpeople.com
The Board of Governors of the Federal Reserve and the Federal Financial Institution Examination Council…
thedigitaltransformationpeople.com
With regards to many other C-level roles, the Chief Information Security Officer (CISO) position is…
thedigitaltransformationpeople.com
A serialized private portal is a unique operating environment that can be identified when it…
thedigitaltransformationpeople.com
Last century standards were presented to prevent cybercrime…but there was minimal theft and standards were…
thedigitaltransformationpeople.com
Unfortunately, cyber-attacks and data breaches are an inevitable part of doing business in today’s data-driven…
thedigitaltransformationpeople.com
Spectacular recent developments in Artificial Intelligence (AI) are feeding many fantasies in the world of…
thedigitaltransformationpeople.com
Technology is mobile and constantly within reach. Because the business world is ever-changing, using mobile…
thedigitaltransformationpeople.com
Cybersecurity needs to be at the heart of the digital transformation, but organisational models will…
thedigitaltransformationpeople.com
A survey conducted by Pew Research, as if we really needed one, indicates at least…
thedigitaltransformationpeople.com
The age-long debate around security metrics and dashboards seems very much alive within the CISO…
thedigitaltransformationpeople.com
Of all the ways digital technologies have touched and improved our lives over the years,…
thedigitaltransformationpeople.com
While data security was never a luxury or afterthought — it’s always been a crucial…
thedigitaltransformationpeople.com