News

Expertise from Forbes Councils members, operated under license. Opinions expressed are those of the author. In today’s digital economy, where organizations rely on cloud computing, mobile technologies ...
Following SK Telecom, a hacking incident at KT has occurred, spreading fears of personal information leaks. On the 21st of last month, Professor Cheon Jeong-hee from the Department of Mathematical ...
The information technology landscape has significantly changed in recent years in terms of corporate value creation (and performance). Wherever data is stored, the digital revolution has created new ...
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection ...
AI, artificial intelligence data protection is a field where South Korea can take first place in the AI industry.” Professor Cheon Jeong-hee from the Department of Mathematical Sciences at Seoul ...
Role-based access control (RBAC) restricts access to patient data based on job responsibilities, reducing risk. Encryption methods like symmetric and asymmetric key schemes safeguard sensitive health ...
In a world where ransomware has morphed into data extortion, encryption is just the bait. The real threat is what’s already gone by the time you realize anything’s wrong. The Fast Company Executive ...