Elevating Users From Products to Customers – The GDPR Data Subject Empowerment The purpose of the General Data Protection Regulation, GDPR, is...Read More
MySQL And COTS OS – A Dangerous Mix Commercial off-the-shelf (COTS) operating systems, which are used by most...Read More
GDPR – How to Protect Against Breach Notification Requirement? The GDPR became law in April 2016, but organizations were...Read More
Protecting PHI – Technical Challenges How to protect PHI against cyber threats and insider attacks?...Read More
Why Not Trust The “root” User With Your Data? These days attacks that are being launched on an organization’s...Read More
How Does Server General Create Tamper-Resistant Logs? Problem: In the case of a regular server, an external...Read More
What Are The Main Challenges Associated With Protecting HIPAA Data? The HIPAA legislation requires that covered entities implement technical safeguards...Read More