Security Experts:

Privacy & Compliance
long dotted


Microsoft on published new details on the user data collection in Windows 10, in an attempt to put controversy on the matter to rest.
This week Yahoo! revealed that the United States made 5,221 governmental requests for Yahoo! user data during the first half of 2015.
Silent Circle announced on Monday that it has started shipping its Blackphone 2 , the first component of its Enterprise Privacy Platform (EPP) announced earlier this year.
A major data-sharing deal between the EU and US is 'invalid' given the spying revelations in the Edward Snowden scandal, the top EU court's main legal advisor said Wednesday in a case brought against Facebook.
Google this week announced improved security and privacy settings for Google Drive and Gmail.
Microsoft and the US government clashed in an appellate court hearing on law enforcement access to emails stored overseas, in a case with important implications for global data protection.
Former US intelligence contractor Edward Snowden on Saturday criticized Russia calling its crackdown on human rights and online freedom "fundamentally wrong" and said he would prefer not to live in exile.
Microsoft has pushed its Diagnostics and Telemetry tracking service to existing in-use Windows 7 and Windows 8 devices in an effort to collect more data on them.
A US appeals court on Friday overturned a ruling that the National Security Agency's bulk collection of phone records was illegal, saying the plaintiffs failed to show they were victims.
The Core Infrastructure Initiative wants to launch a security-focused badge program to encourage open source projects to follow best practices.

FEATURES, INSIGHTS // Privacy & Compliance

rss icon

Torsten George's picture
To achieve continuous compliance and monitoring, organizations are forced to automate many otherwise manual, labor-intensive tasks.
Torsten George's picture
The NIST Cybersecurity Framework is an important building block, but still just the first step towards implementing operationalized defenses against cyber security risks.
James McFarlin's picture
U.S tech giants are playing a game of high-stakes global brinksmanship around who has rights to control their data, which impacts their European growth prospects, business models, and ultimately stock valuations.
Marcus Ranum's picture
To communicate about our metrics, we need ways that we can ground our experience in terms of “normal” for us; Otherwise, we really can't communicate our metrics effectively with anyone who isn't in a similar environment.
Adam Firestone's picture
The misconception that Internet privacy equals anonymity must be dispelled if cyberspace is to be a secure and safe place. At the same time, mechanisms must be incorporated to ensure that communications remain confidential and resistant to unauthorized alteration by third parties.
Mark Hatton's picture
The oversight for the protection of healthcare information is only getting tighter, and it is incumbent upon the security teams to ensure healthcare professionals have all the tools necessary to improve patient outcomes, while we worry about keeping the bad guys away.
Tal Be'ery's picture
The Google-backed "Certificate Transparency" initiative has gained much momentum and may have a real chance to amend the battered Public-Key Infrastructure (PKI).
Nimmy Reichenberg's picture
With the release of PCI-DSS 3.0, organizations have a framework for payment security as part of their business-as-usual activities by introducing more flexibility, and an increased focus on education, awareness and security as a shared responsibility.
Mark Hatton's picture
Complacency is never a good thing, but in security it can have devastating effects. While it’s good to acknowledge progress, that should never stand in the way of staying ahead of the next potential threat.
Chris Coleman's picture
The events that occurred in 2013 will forever be reflected in the Internet DNA of the future, and how the cyber security market evolves to accommodate that future.