Tags: Data MonetizationData PrivacyData Ownershipsecurity-and-risk-strategybig-data
Profile | Contacts | Recent Articles on Subject | |
---|---|---|---|
1 | Zack Whittaker TechCrunch Security editor @TechCrunch. Uses Signal. New York, New York | How to verify a data breach - 8 months ago | |
2 | Nish Amarnath Utility Dive Editor and author. Connected with @industrydive. New York, New York | ||
3 | Emily Olsen Healthcare Dive Reporter at Healthcare Dive. Loyola, Medill alum. Chicago, Illinois | ||
4 | Peter Adams Mobile Marketer Senior reporter, Marketing Dive. New York | ||
5 | Mary E. Shacklett InformationWeek CEO, Transworld Data. | The Deeper Issues Surrounding Data Privacy - 3 months ago Encryption as a Cloud-to-Cloud Network Security Strategy - 4 months ago | |
6 | Davide Castelvecchi Nature Gravitational-wave astrophysicist. New Haven, Connecticut | ||
7 | Lily Hay Newman Wired Security reporter @WIRED. Remember it. New York, New York | The Slow-Burn Nightmare of the National Public Data Breach - 3 months ago Google Is Piloting Face Recognition for Office Security - 5 months ago | |
8 | Matt Burgess Wired Security writer. London | Your Gym Locker May Be Hackable - 3 months ago | |
9 | Carrie Pallardy InformationWeek Freelance Writer and Editor. Chicago | Sensitive Data of Millions Stolen in MSpy Breach - 4 months ago Cyber Risks When Job Hunters Become the Hunted - 7 months ago Data Breaches Just Keep Piling Up - 11 months ago | |
10 | Mike Hennessy Jr, President and CEO Pharmacy Times Pro middleweight boxer. UK/Ireland. |