Security Experts:

Privacy & Compliance
long dotted

NEWS & INDUSTRY UPDATES

The new browser release also includes better web compatibility for privacy protections, and it patches several high-severity vulnerabilities. [Read More]
Many Kansas school districts aren’t taking basic steps to protect their computer systems and the privacy of sensitive information collected about students. [Read More]
The Israeli startup raises new capital to build technology that automates the security and management of SaaS applications. [Read More]
The initiative aims to establish standardization and consistency across cloud platforms, to protect the interests of cloud services organizations, and ensure human rights standards. [Read More]
Private equity firm Symphony Technology Group announced the merger of McAfee Enterprise and the newly acquired FireEye Products into a single pure-play cybersecurity company. [Read More]
Mariana Trench is an open-source tool that Facebook's security team has used internally to identify vulnerabilities in Android and Java applications. [Read More]
Akamai adds new capabilities to help customers thwart ransomware attacks by blocking the spread of malware within an already-compromised enterprise. [Read More]
The newly discovered Tomiris backdoor contains technical artifacts that suggest the possibility of common authorship or shared development practices with the group that executed the SolarWinds supply chain compromise. [Read More]
CISA is telling organizations to patch their Hikvision cameras, just as the FCC announced taking steps toward removing Chinese equipment from U.S. networks. [Read More]
The cybercriminals are demanding $400,000 to be paid in exchange for the decryption key. [Read More]

FEATURES, INSIGHTS // Privacy & Compliance

rss icon

Preston Hogue's picture
You should be asking yourself what your digital vapor trail says about you and its potential impact on your own reputation and the trust others have in you.
Preston Hogue's picture
In the United States, it is consumers’ responsibility to opt out of sharing their information with the services they join—and figuring out how to do so.
Preston Hogue's picture
There have been so many high-profile breaches that a person’s entire life could be laid out, triangulated and, ultimately, faked by someone with the wrong set of intentions.
Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Ashley Arbuckle's picture
Ashley Arbuckle interviews Michelle Dennedy, Cisco’s Chief Privacy Officer (CPO), to discuss how data privacy has a major impact on business.
Preston Hogue's picture
It’s a good reminder that communications in cyberspace can have a long shelf life that both individuals and organizations would be wise to consider.
Laurence Pitt's picture
ePrivacy takes GDPR's approach a step further by ensuring personal and family privacy in relation to data collection, storage and usage.
Justin Fier's picture
Over time, holding people responsible will lead individuals to see how their actions impact the security of the organization and come to consider themselves responsible for the security of the company.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Mike Fleck's picture
GDPR is a regulation-based initiative that will influence the development of information technology over the next decade.