News & Analysis as of

Authentication Risk Mitigation

Ankura

Zero Trust Architecture Best Practices

Ankura on

As cyber threats become increasingly sophisticated, traditional security models that rely on perimeter defenses are no longer sufficient. Zero Trust Architecture (ZTA) offers a modern approach to security that assumes no user...more

Fisher Phillips

You Can No Longer Believe What You See: 5 Ways Employers Can Guard Against Deepfakes

Fisher Phillips on

In their book, “AI 2041: Ten Visions for Our Future,” Kai-Fu Lee and Chen Qiufan point out that we used to live in a world where we could trust video evidence, but not anymore. Thanks to deepfakes – sophisticated digital...more

Farella Braun + Martel LLP

What California’s New Security Law Means to Your Business

Commonsense IoT security steps that startups and small business should consider to comply with California’s new law - California recently enacted a new law, Senate Bill 327, that requires companies that make Internet of...more

3 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide