Contact Tracing: Managing Public Trust Amid Privacy Concerns
Contact tracing apps have become critical tools for managing the global spread of the COVID-19 pandemic — but are we trading-off data privacy to battle […]
Read More →🔥 Upcoming Webinar: The ROI for Security by Design – March 26th | 2pm EST
Security Compass’ research team creates insights that challenge the way we think.
Join us at one of our virtual or in-person events.
Contact tracing apps have become critical tools for managing the global spread of the COVID-19 pandemic — but are we trading-off data privacy to battle […]
Read More →The California Consumer Privacy Act (CCPA) is the most comprehensive privacy regulation at the US-state level, and has now been in effect for two months […]
Read More →In today’s economy, a key business priority is the transformation of organizations to become digital. That is a radical transformation that places the customer front […]
Read More →What lead you to join Security Compass? I graduated in 2004 with a computer science degree – it was in the heyday of the dot […]
Read More →Every year, speakers bring their unique insights and perspectives to the RSA Conference. In February 2020, Security Compass’s Altaz Valani, Security Compass’ Research Director, and Hasan Yasar, […]
Read More →Every year, speakers bring their unique insights and perspectives to the RSA Conference. In February 2020, Security Compass’s Altaz Valani, Security Compass’ Research Director presented: Integrating Our […]
Read More →Let’s jump in our time machine. We won’t go back too long in case it’s dangerous – let’s only go back 10 years to 2010. […]
Read More →As a middle-aged woman in tech, I am tragically aware of the challenges that women face in the workplace. Early in my career, I recall […]
Read More →With several talented people displaced by COVID-19, we thought about talking to our in-house recruiters to understand how they think while recruiting so that it […]
Read More →A well-defined cybersecurity strategy can be a competitive advantage Most often organizations define the value of cybersecurity in terms of regulatory compliance, risk management, or customer […]
Read More →