article thumbnail

China’s draft measures demand ‘individual approval’ for facial recognition use

TechCrunch

The move is building upon the implementation of major tech regulations that rolled out in recent years targeting cybersecurity , data security , and privacy protection. China has seen several major biometric data breaches in recent years, compromising the sensitive information of millions of people.

Hotels 200
article thumbnail

Smart Hotel Trends for Next Decade: From Robots to Digital Detox

Altexsoft

In this Christmas post, we’ll look into the idea of smart hotels, find out which cutting edge innovations are behind it, and sneak a glance at some of the hospitality industry tech pioneers. What does a smart hotel mean for a guest? The hotel app can be your virtual concierge and provide all sorts of assistance. Watch the news?

Hotels 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

A Vision of Radical Networking Simplicity

CIO

Count them: the home Wi-Fi, the ISP, the Internet, a Domain Name System (DNS) provider, a content delivery network (CDN), applications distributed among multiple providers in multiple clouds, credit authentication companies, a private customer information database. In networking today, complexity reigns.

Network 193
article thumbnail

From Solar Sunrise to Solar Winds: The Questionable Value of Two Decades of Cybersecurity Advice

Haft of the Spear

While the Ware Report of 1970 codified the foundations of the computer security discipline, it was the President’s Commission on Critical Infrastructure Protection report of 1997 that expanded those requirements into recommendations for both discrete entities as well as the nascent communities that were growing in and around the Internet.

Security 102
article thumbnail

IDVector Emerges from Stealth with Privacy Focused Secure Public Internet Access Offering

CTOvision

WASHINGTON-- IDVector , a secure Internet access provider, today emerged from stealth mode with a simple and unobtrusive way to safely and securely access the Internet without fear of data interception or data leaks. Public Wi-Fi and ubiquitous Internet access have become a technology staple in our daily lives.

article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

By Bob Gourley DC seems to have a cyber security related event every week. Here are details from the invite: Don’t miss this exciting opportunity to join 1500 IT leaders and innovators on March 11 to collaborate and discuss the top issues in IT security and management. Learn how agencies are turning to BYOD to ensure security and ROI.

Security 104
article thumbnail

Join Prisma Cloud at RSA Conference April 24-27 in San Francisco

Prisma Clud

In the cybersecurity industry, no one goes it alone. Secure From Code to Cloud Prisma Cloud secures applications from code to cloud across multicloud environments. The platform delivers comprehensive security with both continuous visibility and proactive threat prevention throughout the application lifecycle.