Identity intelligence

Results: 296



#Item
111Computer network security / Cyberwarfare / Crime prevention / National security / Security information and event management / Threat / RSA / Analytics / Security controls / Computer security / Security / Data security

BIG DATA FUELS INTELLIGENCE-DRIVEN SECURITY Rapid growth in security information creates new capabilities to defend against the unknown Authors Sam Curry, Chief Technology Officer, Identity and Data Protection business u

Add to Reading List

Source URL: www.emc.com

Language: English
112Security / Identity management / Privacy / HTTP cookie / Email / Authentication / Gmail / Mobile business intelligence / Computing / Internet privacy / Ethics

Dashlane Privacy Policy Welcome to Dashlane! Dashlane SAS, a wholly owned subsidiary of Dashlane Inc. (a Delaware corporation), (“Dashlane”, “we”, “us”, or “our”) operates www.Dashlane.comv(the “Site”

Add to Reading List

Source URL: www.dashlane.com

Language: English - Date: 2014-07-16 09:57:50
113Social issues / Artificial intelligence / Law / Internet privacy / Medical privacy / Hal Abelson / MIT Computer Science and Artificial Intelligence Laboratory / Privacy / Ethics / Identity management

1 Information accountability as the foundation of 21st century privacy protection

Add to Reading List

Source URL: kit.mit.edu

Language: English - Date: 2013-10-07 09:43:25
114Security / OAuth / Electronic commerce / Security token / Identity management / Windows Mobile / OpenID / Mobile business intelligence / Mobile ticketing / Cloud standards / Computing / Computer security

www.ti8m.ch Zürich | Bern ti&m product flyer ti&m secure mobile

Add to Reading List

Source URL: www.ti8m.ch

Language: English - Date: 2014-08-18 05:04:43
115Identity management / Law / Privacy / Accountability / Computer security / Ambient intelligence / Internet privacy / Ethics / Crime prevention / National security

From the Editors Accountability for Perfection P

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2009-03-30 16:04:08
116ERP software / Business / Portal software / SAP NetWeaver / SAP AG / ABAP / SAP NetWeaver Business Intelligence / XApps / Business software / Software / SAP

SAP NetWeaver Identity Management Proof-of-Concept to Package-Price You demand a more detailed insight into the functional opportunities, the benefits and restrictions of SAP NetWeaver Identity Management? As part of a p

Add to Reading List

Source URL: www.wikima4.com

Language: English - Date: 2014-03-24 09:38:00
117Economics / Identity / Business intelligence / Experian / Internet privacy / Analytics / Customer relationship management / Identity theft / Credit card fraud / Financial economics / Business / Credit

FraudNet for Account Takeover With the rapid growth and adoption of new technologies the cyber landscape is constantly evolving. Many organisations are failing to keep up with the pace of change and are not sufficiently

Add to Reading List

Source URL: www.experian.fr

Language: English - Date: 2014-10-14 09:09:14
118Privacy / Internet privacy / Cyber-security regulation / U.S. Department of Defense Strategy for Operating in Cyberspace / Ethics / Identity management / Law

April 15, 2013 Dear Representative: Earlier this year, many of our organizations wrote to state our opposition to H.R. 624, the Cyber Intelligence Sharing and Protection Act of[removed]CISPA). We write today to express our

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2014-03-07 03:03:19
119Al-Qaeda / Central Intelligence Agency / War / International law / Law / Drone attacks in Pakistan / Unmanned aerial vehicle / Targeted killing / Distinction / Laws of war / International relations / War on Terror

SEX AND DRONE STRIKES Gender and identity in targeting and casualty analysis

Add to Reading List

Source URL: www.reachingcriticalwill.org

Language: English - Date: 2014-10-27 17:01:30
120Defense Business Board / Central Intelligence Agency / Credential / Identity management / Knowledge

Employing Our Veterans: Expediting Transition Through Concurrent Credentialing Task Group April 19, 2012

Add to Reading List

Source URL: dbb.defense.gov

Language: English - Date: 2013-05-16 10:30:37
UPDATE