Privacy

Privacy | News, how-tos, features, reviews, and videos

holiday security have i been pwned
artificial intelligence brain machine learning digital transformation world networking

collage of US government icons

Will the US ever get serious about security and privacy?

We have the ability to drastically reduce cybercrime. So why are we still failing?

European Union, EU

General Data Protection Regulation (GDPR): What you need to know to stay compliant

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that...

The U.S. Capitol building in Washington

Federal cybersecurity agency on the way?

As human activity migrates into the online space, keeping the bad guys from mucking it all up becomes paramount. Does that mean it’s time for a federal cybersecurity agency?

GDPR / data privacy / protection

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.

ethics typewriter keys values morals

Digital ethics rising in importance

We must keep in mind that just because we have the ability to deploy a new technological innovation does not mean that we should. The need to prioritize digital ethics is becoming increasingly important for all organizations that are...

sacramento california state house

Proposed changes to California Consumer Privacy Act of 2018 could rewrite privacy law

A recently proposed repeal of 2018's CCPA called the PAA would shift California even closer to the requirements of the GDPR.

big brother privacy eye data breach security binary valerybrozhinsky getty

FEMA contractor at center of privacy violation provides services to many other agencies

Corporate Lodging Consultants provides lodging services to many other government agencies. Is more sensitive personal information at risk?

julian assange wikileaks 1

Julian Assange arrested: Hero of transparency and privacy, or villain against nations?

Just because you can take something doesn’t mean you should...or that it’s the right thing to do.

Binary stream flowing through the fingers and palm of an upturned hand.

The ethical use of data

When thinking about data privacy and security, the focus is typically on how to keep the bad guys from gaining unauthorized access to our data. We spend billions of dollars every year as an industry to protect our data, and that of...

Facebook Data Debacle - Android

Facebook stashing plain text passwords is a wake-up call to improve GRC

Facebook storing hundreds of millions of user passwords in plain text demonstrates the urgent need for more effective governance, risk management and compliance at public companies.

asia china flag grunge stars pixabay etereuti

Huawei and Apple smartphones are both made in China – why is only one banned in Australia?

While Chinese smartphone manufacturer Huawei has been banned from the Australian 5G network rollout, Apple was welcomed with open arms despite also using China to produce phones. So, what’s the difference?

certification school pencils diversity creative team by evgeny555 getty

Cybersecurity education in the age of acceleration

The cyber threat landscape demands professional development initiatives.

orange number 5 pool ball top five 5 tips

Top 5 solutions to reduce ‘cyber friction’

The biggest problem areas and solutions to reduce friction between cybersecurity, privacy and legal teams.

nycrr cybersecurity gavel regulation compliance law nyc statue of liberty

Landmark laws: data brokers and the future of US privacy regulation

Vermont’s new law on data brokers has revealed an expansive registry of secretive firms profiting from your corporate and personal data. As the first law of its kind in the US, privacy advocates have rejoiced – but how much will it...

A hooded man in a halloween mask raises a finger to his lips to encourage silence.

North Korean hackers target Russian-based companies

The North Korean Lazarus APT group is going after the Russians. Russian hackers, however, needed less than 20 minutes in 2018 to completely pwn an organization.

Electronic Health Records [EHR] / digital medical data, monitor health status, doctor, laptop

2.7M recorded medical calls, audio files left unprotected on web

Every call made to 1177 Swedish Healthcare Guide service since 2013, and answered by the subcontractor Medicall, was stored on an unprotected server.

big brother privacy eye data breach security binary valerybrozhinsky getty

Have we reached peak privacy? How good IAM and privacy can coexist

Why privacy needs to remain at the forefront of identity and access management.

network iot world map us globe nodes global

Cybersecurity: A global threat that we can control

Protecting data and thwarting cyberattacks now have ascended alongside dealing with natural catastrophes as the most pressing threats demanding the world’s full attention.

Load More
You Might Also Like