Security Experts:

Privacy & Compliance
long dotted

NEWS & INDUSTRY UPDATES

At the very moment that GDPR came into force at midnight on May 25, 2018, Facebook changed its terms and conditions statement into a ‘Terms of Service’ statement. [Read More]
Private data sharing solutions provider TripleBlind has raised $24 million in a Series A funding round. [Read More]
Password auditing and recovery tool L0phtCrack has been released as open source and the project is looking for both maintainers and contributors. [Read More]
With 6,000 out of 30,000 observed clusters of activity, GandCrab emerged as the most active ransomware family wreaking havoc on the Windows ecosystem. [Read More]
Data privacy compliance startup CYTRIO announces its launch with $3.5 million in seed funding. [Read More]
The Linux Foundation has secured a $10 million investment to expand the operations of the Open Source Security Foundation (OpenSSF). [Read More]
The Microsoft Patch Tuesday train for October rolled in with fixes for at least 71 Windows security defects and an urgent warning about a newly discovered zero-day cyberespionage campaign. [Read More]
Full video of panel discussion from SecurityWeek's 2021 CISO Forum on navigating software bill of materials (SBOM) and supply chain security transparency. [Read More]
Redmond threat hunters technical details on UNC-0343, an Iran-linked apex actor using password spraying to break into Office 365 accounts since at least July 2021. [Read More]
Mondoo plans to use the new funding to accelerate development of its cloud-native platform to provide developers with automated risk assessments. [Read More]

FEATURES, INSIGHTS // Privacy & Compliance

rss icon

Gordon Lawson's picture
While obscurity is an offensive tool for attackers, it also represents a defensive measure for organizations. Let’s consider the benefits of concealing network infrastructure and activity from the outside world to reduce the enterprise attack surface.
Preston Hogue's picture
There is a dawning realization of the potential danger posed by algorithms, written by humans to steer other humans.
Preston Hogue's picture
Everywhere you go, you cast a shadow of data that, taken together, reveals who you are, what you like to do, your habits, your addictions.
Alastair Paterson's picture
For companies based in the U.S. with customers and files in many different countries, reconciling conflicting practices and laws is likely to remain a serious headache for years to come.
Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Josh Lefkowitz's picture
Regardless of which framework you use, it’s crucial to operationalize it in the context of your organization’s unique environment and risk factors.
Laurence Pitt's picture
In the coming years the data protection and privacy landscape will change dramatically, improving the experience for us as individuals but potentially making things more complex for businesses.
Alastair Paterson's picture
With more legislation expected, every company should ensure they have a robust framework in place along with strong data mapping capabilities.
Torsten George's picture
By implementing the core pillars of GDPR, organizations can assure they meet the mandate’s requirements while strengthening their cyber security posture.