Privacy

Privacy | News, how-tos, features, reviews, and videos

att AT&T logo american flag

8 AT&T buildings that are ‘central to NSA spying’

Here are eight AT&T-owned locations, buildings that are reportedly central to the NSA's internet spying purposes.

1 fake profile

Why we need to be worried about deepfake videos

The potential security threat of realistic fake videos of people doing and saying things they never did is cause for concern. Learn why and how they were developed, the risk they might represent when they spill beyond the world of...

private public hybrid cloud technology sign

Our digital data is more valuable than our non-digital data. So why do we care less?

A framework to protect our digital data using a shared responsibility model based on data value.

protection privacy security internet network lock

2018: The year data privacy got real

As a company executive, it is critical to understand how your business stores, shares, analyzes and protects its core private data, particularly that of customers and employees. Today, this is a monumental task – machine learning...

question marks pavement

What does GDPR mean for an organization's hybrid IT strategy?

Effective May 25th, GDPR set off a wave of privacy updates that forced organizations to reevaluate their IT strategies. Without the right approach, your business will be impacted.

struggle to cultivate digital primary2

It was 35 days to GDPR, and a lot of sleepless nights

GDPR went live on May 25, 2018. A month before the implementation date, attendees at the RSA Conference struggled with being fully ready.

subway station 87638274

China increases its surveillance state

China plans to add bio-recognition technology to subways and to install RFID chips in vehicle windshields.

girl hands privacy stop

The costs, the privacy and the security of IAM and personal data sharing

Resolving the issues of data storage and security when implementing life management platforms.

gdpr

GDP…Argh!

Personal data has become a commodity to be collected, bought, sold and traded without user consent. GDPR aims to change that.

rog

Gamers: Is Red Shell 'spyware' being used in the games you play?

Some game developers use Red Shell to fingerprint gamers for marketing purposes, and gamers are not happy, forcing many to remove it.

orange monitors with lock icon network security cyber threat

GDPR: Where we were…and where we’re going

It’s clear that conventional methods to data security aren’t working anymore, so it’s time to step away from breach prevention and focus on a “secure breach” approach.

mit csail ai artificial intelligence

MIT's AI can now 'see' and track people through walls using wireless signals

The RF-Pose system developed by MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) can track a person through walls or identify one specific person out of a group of 100.

rules procedures manuals one way signs

GDPR is live! – Now what?

GDPR rules are a hot mess. Get clarity by further identifying all your GDPR weak spots.

globe

Why Africa’s private sector should be concerned about more than the GDPR

The European Union General Data Protection Regulation (GDPR) has generated strong interest in Africa’s private sector. However, the bigger picture shows massive gaps across Africa’s data privacy landscape. This article highlights some...

us eu flag

The GDPR initiative and how it affects US government and industry

Don't make the mistake of thinking the GDPR regulation only affects our friends and neighbors overseas. There may be real implications here at home.

deleting facebook

Facebook gave access to data on users and their friends to 60 device makers

Facebook may have violated a settlement with the FTC and promises made to users, as well as lied to Congress over giving users' complete control of their data.

Government building with greek columns

How GDPR impacts US cybersecurity policy

With the GDPR in full effect, expect to start seeing an impact in the US sooner vs. later. All it will take is the next major data breach for the American public to start demanding ownership of their personal data.

vulnerable gdpr breach security cyber attack

GDPR is here – now what?

Look at the General Data Protection Regulation (GDPR) and the revised Payment Services Directive (PSD2) as opportunities to adopting sound data protection practices.

blue padlock in circle pixels digital security padlock

When security and privacy overrule convenience

Organizations can enable end-to-end API security with OAuth, OpenID Connect and ABAC.

open door with sunlight shining through

Feeling secure enough to use open source for IAM projects

Using open source software to add functionality to your IAM systems within a secure framework.

Load More