Privacy

Privacy | News, how-tos, features, reviews, and videos

California Consumer Privacy Act  / CCPA  >  State flag superimposed on map and satellite view

Passage of California privacy act could spur similar new regulations in other states

Voters approved the California Privacy Rights and Enforcement Act (CPRA), which in part limits how organizations can use personal data. Legal experts expect other states to follow suit.

Tech Spotlight   >   IT Leadership [CSO]   >   A woman shakes hands with another.

The CISO’s newest responsibility: Building trust

Leading CISOs have already embraced the concept of trust as a deliverable and indeed are making it the central theme of their entire security function.

A circuit board with CPU / chip displaying glowing binary code.

Homomorphic encryption tools find their niche

Current homomorphic encryption offerings require fewer specialized skills and are proving themselves effective in some use cases.

A magnifying lens examines top secret information amid binary code.

Confidential Computing: What is it and why do you need it?

Confidential Computing can significantly enhance enterprise security, but what is it, and what do you need to do about it?

Encryption  >  Encrypted data / hexadecimal code

4 hot areas for encryption innovation

Researchers are making progress on a variety of approaches to strengthen encryption techniques and algorithms. Here are some of the hottest areas in cryptographic research.

Encryption  >  Encrypted data / hexadecimal code

Homomorphic encryption: Deriving analytics and insights from encrypted data

Homomorphic encryption allows safe outsourcing of storage of computation on sensitive data to the cloud, but there are trade-offs with performance, protection and utility.

A censorship label is splashed across an image of a man hiding behind his laptop.

TLS attacks and anti-censorship hacks

Despite safeguards in TLS 1.3, China is still censoring HTTPS communications, according to a new report. There are workarounds to this. Plus, how TLS can be used as an attack vector.

United States-United Kingdom flags with binary data flow under a magnifying lens.

What the end of Privacy Shield, Brexit mean for UK-US data flows

The fall of US data agreement further complicates the post-Brexit data situation for many companies.

GDPR / data privacy / protection

EU court invalidates Privacy Shield data transfer agreement

US companies receiving EU personal data under Privacy Shield will need to find a replacement legal mechanism, and the decision could affect data protection policies and procedures.

California Consumer Privacy Act  / CCPA  >  State flag / secured data

California Consumer Privacy Act (CCPA): What you need to know to be compliant

The California Consumer Privacy Act (CCPA) is a law that allows any California consumer to demand to see all the information a company has saved on them, as well as a full list of all the third parties that data is shared with.

CIO | Middle East  >  A woman uses a mobile phone amidst abstract binary data and processing arrows.

Want better mobile security or privacy? Try these Android and iOS alternatives

GrapheneOS offers hardened security over Android, while /e/OS locks down your private information. The main trade-off for both is fewer apps.

Network security  >  simplified / centralized / unified

Zero Trust: Protecting your company inside and out

The traditional castle-and-moat security model where users, once inside the firewall, were automatically trusted has long been outdated. What if you can't trust anyone in or outside your network?

CCTV security cameras gather data during traffic surveillance.

Lessons learned from the ANPR data leak that shook Britain

The recent ANPR data leak raised questions regarding privacy versus data security with public surveillance systems. How do private and public organizations maintain transparency while protecting personal data?

EU / European Union / GDPR data privacy protection, regulation, compliance

General Data Protection Regulation (GDPR): What you need to know to stay compliant

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that...

Test tube vial of serum labeled COVID-19 stands beside a respirator mask / coronavirus / pandemic

Protecting employee COVID-19 health data: What CISOs need to know

Most companies are tracking coronavirus-related health data of their employees, and this presents unique risks and security challenges for CISOs.

COVID-19 contact tracing app

4 critical issues surrounding contact-tracing apps

As countries rush to release contact-tracing apps, experts fear a lack of security and privacy controls.

A man with an umbrella stands waist-deep in water as rain continues to fall.

5 steps to create a security incident response plan

Creating an incident response plan can seem like a daunting task, but there are ways to break the process down into manageable pieces. (Plus: Video on how to create a pandemic disaster recovery plan.)

COVID-19 coronavirus / network of vectors

New coronavirus-era surveillance and biometric systems pose logistical, privacy problems

Governments and companies are using biometrics and geolocation to identify and track potential coronavirus victims in the name of public safety.

A woman and a man have a conversation while holding a notebook and pen, coffee and a mobile tablet.

How CISOs and data privacy officers should work together

Close collaboration between CISOs and DPOs can benefit both roles in their efforts to better understand, align with and protect the business.

Statue of Lliberty as a digital framework / New York / binary code

New York's SHIELD Act could change companies’ security practices nationwide

SHIELD Act provisions broaden the scope of consumer privacy and place requirement on protecting personal data for organizations that collect information on New York residents.

Load More