Data Privacy

Data Privacy | News, how-tos, features, reviews, and videos

business travel / airport terminal walkway / traveller
U.S. + U.K. flags merged with binary code overlay  >  US CLOUD Act / UK COPOA Act

Business ethics  >  Handshake extended in trust / reliability / transparency

The CISO’s newest responsibility: Building trust

Trust is becoming a differentiator in the marketplace, and CISOs who seek a more strategic role in their must engage the full range of stakeholders to build confidence that the organization has their best interests in mind.

Political data > Republican + Democratic mascots in a binary world

Presidential campaign websites fail at privacy, new study shows

A non-partisan analysis of 23 presidential campaign websites reveals glaring privacy issues.

tt19 038 thumb
video

How the California Consumer Privacy Act (CCPA) will affect you and your business | TECH(talk)

The California Consumer Privacy Act (CCPA) is, in some ways, similar to Europe's GDPR. This rule, which goes into effect in 2020, gives individual users more ownership over their own data. Users can even refuse to allow companies to...

iot security networking privacy

Data privacy in the IoT age: 4 steps for reducing risk

As internet of things (IoT) devices proliferate, corporate security teams face a steep challenge around data privacy. Here's what you can do now to protect your company.

Compliance

11 new state privacy and security laws explained: Is your business ready?

States from Maine to California have recently enacted privacy, data security, cybersecurity, and data breach notification laws. Let's break down what each of these laws entails and how businesses and consumers are affected.

distributed / decentralized network connections across the globe

How a decentralized cloud model may increase security, privacy

A new cloud model can support scalable applications while retaining safeguards of a decentralized, trust-minimized ecosystem.

security internet network encryption privacy padlock

Cybersecurity pros' haphazard participation in data privacy raises concern

Limited training and unclear roles/responsibilities for cybersecurity teams restrict the effectiveness of data privacy programs.

red light / warning / caution / alert / sign of threat or danger

Emerging security threats at the half-year mark

We’ve hit the halfway mark of 2019, and I’m sure that we have all noticed some interesting happenings in the cybersecurity world. I’d like to highlight a few that I’ve found interesting, but also disturbing – and I am sure that there...

passwords exposed authentication hacked vulnerable security breach

IT services giant HCL left employee passwords, other sensitive data exposed online

HCL left employee passwords, customer project details, and other sensitive information exposed online with no authentication.

tf19 025 facebook fined
video

Facebook faces billions in potential fines | TECH(feed)

Amidst a slew of user data mishandlings, Facebook could be faced with billions of dollars of fines from regulatory bodies across the globe. But how much would a few billion dollars actually affect the company? On this episode of...

sacramento california state house

Proposed changes to California Consumer Privacy Act of 2018 could rewrite privacy law

A recently proposed repeal of 2018's CCPA called the PAA would shift California even closer to the requirements of the GDPR.

big brother privacy eye data breach security binary valerybrozhinsky getty

FEMA contractor at center of privacy violation provides services to many other agencies

Corporate Lodging Consultants provides lodging services to many other government agencies. Is more sensitive personal information at risk?

Binary stream flowing through the fingers and palm of an upturned hand.

The ethical use of data

When thinking about data privacy and security, the focus is typically on how to keep the bad guys from gaining unauthorized access to our data. We spend billions of dollars every year as an industry to protect our data, and that of...

vulnerable gdpr breach security cyber attack

Does GDPR compliance reduce breach risk?

A new report from Cisco suggests that GDPR compliance reduces data breach impact. Incident response, legal and security experts agree but caution not to rely on compliance alone.

asia china flag grunge stars pixabay etereuti

Huawei and Apple smartphones are both made in China – why is only one banned in Australia?

While Chinese smartphone manufacturer Huawei has been banned from the Australian 5G network rollout, Apple was welcomed with open arms despite also using China to produce phones. So, what’s the difference?

boxes box idea outside the box it as a product surprise unique masterzphotois getty

Self-sovereign identity: 3 key questions

SSI is on the extreme end of the digital identity spectrum. Its focus is putting control back in the hands of you, the user. But SSI is not the only way to skin a cat.

face superimposed on keyboard privacy hacker

Preserving the privacy of large data sets: Lessons learned from the Australian census

Preserving the privacy of large data sets is hard, as the Australian Bureau of Statistics found out. These are the big takeaways for the upcoming U.S. census and others dealing with large amounts of personal data.

nycrr cybersecurity gavel regulation compliance law nyc statue of liberty

Landmark laws: data brokers and the future of US privacy regulation

Vermont’s new law on data brokers has revealed an expansive registry of secretive firms profiting from your corporate and personal data. As the first law of its kind in the US, privacy advocates have rejoiced – but how much will it...

Load More