TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

The Rise of Mobile Espionage

by PrivoroSep 22, 2017

Addressing the specifics of mobile espionage, this whitepaper highlights the who, what, where, why and how of one of today's top smartphone security concerns.

  • Privoro
  • Mobile security
  • Security Monitoring
  • Details

Five Smartphone Myths and Facts

by PrivoroSep 22, 2017

Five misconceptions surrounding smartphones and mobile espionage. Replace myth with fact and understand the best methods for protecting your sensitive information.

  • Privoro
  • Mobile security
  • Security Monitoring
  • Details

The Art and Science of Securing Audio Signals and Safeguarding Information

by PrivoroSep 22, 2017

Learn about mobile audio surveillance and how hackers hijack microphones to eavesdrop on conversations. Independent researchers confirm, using highly specialized equipment, how Privoro's unsurpassed active audio masking drowns individual microphones with truly randomized noise.

  • Privoro
  • Mobile security
  • Security Monitoring
  • Details

Survey on Smartphone Security

by PrivoroSep 22, 2017

In a poll conducted by Privoro and Corus Research, consumers share their views on mobile surveillance and smartphone hacking.

  • Privoro
  • Mobile security
  • Security Monitoring
  • Details

The Risk of Leaving Smartphone Sensors Unprotected

by PrivoroSep 22, 2017

Unprotected smartphones could pose the greatest security risks to governments, enterprises and individuals. Consider what's at stake and prevent hackers from capitalizing on your information.

  • Privoro
  • Mobile security
  • Security Monitoring
  • Details

Former US CTO Megan Smith Talks Tech Transformation & Innovation

by AllAnalyticsSep 19, 2017

How do you transform and prepare a big organization to be ready for opportunity and success? Many companies are facing that challenge right now as they prepare to compete in a new era of analytics-driven business. And who knows better about a job like that than the CTO of the US. Megan Smith is the third Chief Technology Officer (CTO) of the US, and left the role this year. She joined a special edition of AllAnalytics to share her experiences transforming a large organization and more.

  • AllAnalytics
  • Executive Insights & Innovation
  • IT Strategy
  • Strategic CIO
  • IT Leadership
  • Details

Evolution of the Data Scientist Role

by AllAnalyticsSep 19, 2017

In the years since data scientist was declared the sexiest job, the role itself has evolved. As happens with any job, hiring managers have been adjusting their expectations for data science candidates, and executives are defining the role of the data scientist in ways that meet the needs of their organizations.

Many organizations have abandoned the "unicorn" concept, which imposed so many technical and business requirements on the "ideal candidate" that said candidate could have been

  • AllAnalytics
  • Team Building & Staffing
  • Digital Business
  • Details

GDPR: What Executives and Board Members Need to Know

by CyberArkSep 15, 2017

The intent of the EU Council's General Data Protection Regulation (GDPR) is to better address the protection of personal data, and because individuals may have the right to receive compensation from the controller in situations related to non-compliance, you'll want to be sure to pass along this one-page primer to executive management.

  • CyberArk
  • Risk Management/Security
  • Database Security
  • Details

How to Get Ready for the Next Wave of Advanced Analytics: AI and Machine Learning

by AllAnalyticsSep 15, 2017

Artificial intelligence and machine learning have hit the mainstream, spanning consumer devices to enterprise initiatives. Experts in the field say change is coming fast. But just where are we? If you don't have your plan started, are you behind the curve??

AllAnalytics reached out to several thought leaders in the areas of AI, machine learning, and advanced analytics to get their perspective. Their answers to the four questions we posed will help prepare you and your organization for

  • Big Data Analytics
  • IT Strategy
  • AllAnalytics
  • Details

Securing Privileged Access And The Swift Customer Security Controls Framework (CSCF)

by CyberArkSep 15, 2017

In an effort to establish a consistent secure framework and baseline of accountability, The Society of Worldwide Interbank Financial Telecommunication (SWIFT) has introduced the SWIFT Customer Security Controls Framework (CSCF).

Learn how you can leverage Privileged Account Security to assist with SWIFT CSCF compliance.

  • CyberArk
  • Risk Management/Security
  • Database Security
  • Details