Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Google says it’s making progress on plans to revamp Chrome user tracking technology aimed at improving privacy even as it faces challenges from regulators and officials. [Read More]
A misconfiguration resulted in more than 1,000 stolen corporate credentials exposed in plain sight. [Read More]
WhatsApp on Friday postponed a data-sharing change as users concerned about privacy fled the Facebook-owned messaging service and flocked to rivals Telegram and Signal. [Read More]
Any EU country can take legal action against companies like Facebook over cross-border violations of data privacy rules, not just the main regulator in charge of the company. [Read More]
Google, Twitter and Amazon are hopeful that Joe Biden's incoming administration in the United States will enact a federal digital data law, senior company officials said at CES, the annual electronics and technology show. [Read More]
WhatsApp on Tuesday reassured users about privacy at the Facebook-owned messaging service as people flocked to rivals Telegram and Signal following a tweak to its terms. [Read More]
A watchdog agency for the U.S. Census Bureau says that proper information-technology security safeguards weren’t in place leading up to the start of the 2020 census. [Read More]
Shared Responsibility Matrices define the security and privacy responsibilities of cloud providers and their customers. [Read More]
User credentials, personally identifiable information, and other types of data belonging to United Nations Environment Programme employees exposed. [Read More]
Singapore has admitted data collected for contact-tracing can be accessed by police despite earlier assurances it would only be used to fight the coronavirus, sparking privacy concerns about the scheme. [Read More]

FEATURES, INSIGHTS // Privacy

rss icon

Laurence Pitt's picture
ePrivacy takes GDPR's approach a step further by ensuring personal and family privacy in relation to data collection, storage and usage.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Lance Cottrell's picture
Even while using Tor hidden services, there are still many ways you can be exposed and have your activities compromised if you don’t take the right precautions.
Travis Greene's picture
GDPR is proving disruptive for European citizens who are no longer able to interact with services from outside the EU. And the compliance costs can be significant as well. But are there legitimate concerns of overreach?
Lance Cottrell's picture
Failing to consistently use identity hiding technologies is the most common way to blow your online cover. Just one failure to use your misattribution tools can instantly connect your alias to your real identity.
Preston Hogue's picture
With each new digital industry, process or service comes a new data source that can be compiled and cross referenced, introducing new ways to see into people’s lives, activities and business operations.
Lance Cottrell's picture
Facial recognition systems are becoming cheaper, better, easier to use, and more widely deployed, while social media platforms are creating an ocean of easily identifiable faces that are widely accessible.
Steven Grossman's picture
How can a company protect its information and operations without running askew of data privacy laws and the concerns of its customers?
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.
Lance Cottrell's picture
By surreptitiously monitoring and engaging with potential attackers and malware developers you can successfully gain information about emerging attack methods, patterns, and practices in the cyber underground.