Security Experts:

Privacy & Compliance
long dotted

NEWS & INDUSTRY UPDATES

Start-up tokenization firm introduces a solution to the Right to be Forgotten (RTBF) problem inherent in new data protection and privacy legislation. [Read More]
Public cloud data protection provider Laminar has emerged from stealth with $32 million in Series A funding led by Insight Partners. [Read More]
Google paid roughly $60,000 in bug bounty rewards to the external security researchers reporting high-severity vulnerabilities in Chrome. [Read More]
Mandiant researchers says narratives used in the Ghostwriter information operations campaign are aligned with Belarusian government interests, suggesting at least partial involvement. [Read More]
Researchers showcase new attack that relies on non-uniform and frequency-based Rowhammer access patterns to bypass Target Row Refresh (TRR) on DDR4 DRAM. [Read More]
Microsoft-owned GitHub warns that a pair of newly discovered vulnerabilities continue to expose the soft underbelly of the open-source software supply chain. [Read More]
Chipmakers Intel and AMD release patches for multiple vulnerabilities in multiple products, including a series of high severity issues in software drivers. [Read More]
Zoom ships multiple security bulletins calling special attention to a pair of “high-risk” bugs affecting its on-prem meeting connector software and the popular Keybase Client. [Read More]
U.S. Vice President Kamala Harris on Wednesday announced support for the Paris Call for Trust and Security in Cyberspace. [Read More]
Palo Alto Networks is calling urgent attention to a critical-severity vulnerability in its GlobalProtect portal and gateway interfaces. [Read More]

FEATURES, INSIGHTS // Privacy & Compliance

rss icon

Preston Hogue's picture
You should be asking yourself what your digital vapor trail says about you and its potential impact on your own reputation and the trust others have in you.
Preston Hogue's picture
In the United States, it is consumers’ responsibility to opt out of sharing their information with the services they join—and figuring out how to do so.
Preston Hogue's picture
There have been so many high-profile breaches that a person’s entire life could be laid out, triangulated and, ultimately, faked by someone with the wrong set of intentions.
Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Ashley Arbuckle's picture
Ashley Arbuckle interviews Michelle Dennedy, Cisco’s Chief Privacy Officer (CPO), to discuss how data privacy has a major impact on business.
Preston Hogue's picture
It’s a good reminder that communications in cyberspace can have a long shelf life that both individuals and organizations would be wise to consider.
Laurence Pitt's picture
ePrivacy takes GDPR's approach a step further by ensuring personal and family privacy in relation to data collection, storage and usage.
Justin Fier's picture
Over time, holding people responsible will lead individuals to see how their actions impact the security of the organization and come to consider themselves responsible for the security of the company.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Mike Fleck's picture
GDPR is a regulation-based initiative that will influence the development of information technology over the next decade.