The Latest in IT Security

Posts Tagged ‘photos’

Rules under the Children’s Online Privacy Protection Act require websites and online services directed at children to take the consent of the child’s parent before collecting personal information of the child. The U.S. Federal Trade Commission, after a long debate including public comment, has allowed the use of a new method involving facial recognition and […]

Read more ...

Remember last year’s well-publicized leak, which exposed some celebrities’ nude photos? The story not only made some individuals’ day (and probably night), it turned to be a very educating precedent. For instance, it made many people realize that their pet’s name is not the safest password, and two-factor authentication is not meant exclusively for IT […]

Read more ...

Even though I’m a “tool guy”, I’ve never bothered with tools that help me find duplicate files. I know they’re common and I’ve heard a lot from our TuneUp users that it’s a feature they always wanted us to build. I always wondered why would there be so many duplicate files on my hard disk? […]

Read more ...


Categories

THURSDAY, DECEMBER 12, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments