Privacy

Privacy | News, how-tos, features, reviews, and videos

keys to access solutions answers open
macos mojave mac app stor

encryption decryption key code

Five Eyes threatens to force encryption backdoors, says 'privacy is not absolute'

The Five Eyes government intelligence alliance issued an encryption ultimatum to tech companies and device makers.

creepy teacher chalkboard wolf

Complying with emerging privacy regulations: sometimes you need a silver cannonball

With GDPR compliance and other privacy regulations around the world in 2018, no small, simple solution exists.

binary world map and cybersecurity lock

Cyber to the people! The democratization of security

How can mid-market companies start the revolution of the democratization of the cyber security industry?

Globe with orbiting speech bubbles containing world flags, sitting on the edge of a laptop.

Traveling to China for work? Punch through the Great Firewall and securely connect with your home office

Security is not just about confidentiality and integrity. It's also about availability. The new partnership between Wickr and Psiphon is worth a look for global enterprises with traveling employees.

indian woman texting

Why SMS banking is still a bad idea

Bank customers like the convenience of accessing data via text message, but security experts have concerns about financial textbots.

supply chain

In the cloud era, government can only be as secure as its supply chain

While regulation is often seen as antithetical to technological progress, the supply chain is an area where clearly-defined, reasonable directives have had a tremendously positive effect on the security and technological leadership of...

thinkstock privacy please

Vegas hotel room checks raise privacy, safety concerns at Def Con, Black Hat

Do Not Disturb means nothing at Caesars Entertainment hotels, as Def Con and Black Hat attendees had their privacy and potentially their safety threatened by hotel security busting in to search rooms.

pros and cons compare thumbs up thumbs down evaluate balance

AI in cybersecurity: what works and what doesn't

Much of what we hear about artificial intelligence and machine learning in security products is steeped in marketing, making it hard to know what these tools actually do. Here's a clear-eyed look at the current state of AI & ML in...

data security

Get serious about consumer data protection

With the CCPA coming hot on the heels of the GDPR it makes sense to get your consumer data management in order. Taking steps to protect all private data today will pay dividends tomorrow.

gdpr

The unintended consequences of GDPR

This is not what the regulators had in mind. Business leaders, ignore at your own peril.

ccleaner

Avast pulls CCleaner version that lacked privacy options after backlash

Avast-owned Piriform reverted to a previous version of CCleaner in response to user outrage over its new data collection policy that had no privacy options.

ocean surf millimeter wave wireless technology sound waves abstract audio graphic

The rolling tide that is GDPR … say hello to the CCPA

Think you dodged the GDPR bullet because you’re not in Europe? Guess again. California just brought that home for millions of businesses.

california on map of western usa 97656788

Is California’s Consumer Privacy Act of 2018 going to be GDPR version 2?

Discussing the California Consumer Privacy Act of 2018, which covers businesses that collect or sell information about California residents. Some view it as the General Data Protection Regulation 2.0.

face superimposed on keyboard privacy hacker

California Consumer Privacy Act: What you need to know to be compliant

California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.

Man on phone in airport

Secret Quiet Skies surveillance program tracks citizens not suspected of wrongdoing

The TSA has a secret, domestic Quiet Skies surveillance program that includes federal air marshals tracking U.S. travelers not under investigation or suspected of wrongdoing.

audit binary compliance magnifying glass investigate

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.

cwan 013 6securityreasons win10
video

6 security reasons to upgrade to Windows 10

From advanced authentication to new privacy controls, Windows 10 offers users solid security reasons to upgrade.

face superimposed on keyboard privacy hacker

Is privacy even possible in this Golden Age of Data Breaches?

Privacy seems like a pipe dream when everyone’s data seems vulnerable. Do we just give up on it though?

Load More