FACIAL RECOGNITION TECHNOLOGY: Current and Planned Uses by Federal Agencies
Why GAO Did This Study Facial recognition—a type of biometric technology—mimics how people identify or verify others by examining their...
Why GAO Did This Study Facial recognition—a type of biometric technology—mimics how people identify or verify others by examining their...
The ability to identify someone’s face is a talent we all rely on, both for our social interactions, as well...
This report examines the potential use of mobile device biometrics by first responders and discusses the challenges in detail.
This is the third in a series of reports on ongoing face recognition vendor tests (FRVT) executed by the National...
If your nonprofit is considering managed IT services, it’s critical to work with a company that can provide high-quality service...
Cybersecurity is a topic that has become more and more visible to nonprofits in the years since we started this...
The Westin Research Center has created this chart mapping several comprehensive data protection laws to assist iAPP members in understanding...
The Privacy Framework is intended to help organizations build better privacy foundations by bringing privacy risk into parity with their...
This report contemplates best practices for data governance, data protection, the sharing of data relating to cybersecurity, and the protection...
The study found that hacking/IT incidents are the most prevalent forms of attack behind healthcare data breaches, followed by unauthorized...
Security through data
© 2023 | CyberMaterial | All rights reserved.
World’s #1 Cybersecurity Repository
© 2022 Cybermaterial - Security Through Data .