Security Experts:

Privacy & Compliance
long dotted


The Court of Justice of the European Union (CJEU), the highest constitutional court of the EU, has effectively slapped down the UK's new Investigatory Powers Act. [Read More]
Google releases Project Wycheproof, a tool designed to test cryptographic software libraries for known vulnerabilities [Read More]
Researchers analyzed 44,000 plugins from the official WordPress plugin directory and found vulnerabilities in more than 8,800 of them [Read More]
Two APT groups used the same Flash Player zero-day to spy on Turkish citizens living in Turkey and various European countries [Read More]
Authentication bypass flaw in Skype for Mac could have been exploited by malware to interact with the app [Read More]
Linux users who want an extra layer of security can try out the first alpha version of the Sandboxed Tor Browser [Read More]
Private Internet Access has contracted cryptography expert Matthew Green to conduct a comprehensive audit of OpenVPN [Read More]
EU and US consumer watchdogs are filing complaints against a clutch of smart toys that can "spy" on children and their homes, for allegedly breaching privacy and data protection laws. [Read More]
Researchers discovered several cURL vulnerabilities in audit sponsored by the Mozilla Secure Open Source program [Read More]
Matrix’s ‘Olm’ aims to allow any user on one system to communicate with any user on a different system with End-to-end Encryption; just like email today. [Read More]

FEATURES, INSIGHTS // Privacy & Compliance

rss icon

Mark Hatton's picture
The oversight for the protection of healthcare information is only getting tighter, and it is incumbent upon the security teams to ensure healthcare professionals have all the tools necessary to improve patient outcomes, while we worry about keeping the bad guys away.
Tal Be'ery's picture
The Google-backed "Certificate Transparency" initiative has gained much momentum and may have a real chance to amend the battered Public-Key Infrastructure (PKI).
Nimmy Reichenberg's picture
With the release of PCI-DSS 3.0, organizations have a framework for payment security as part of their business-as-usual activities by introducing more flexibility, and an increased focus on education, awareness and security as a shared responsibility.
Mark Hatton's picture
Complacency is never a good thing, but in security it can have devastating effects. While it’s good to acknowledge progress, that should never stand in the way of staying ahead of the next potential threat.
Chris Coleman's picture
The events that occurred in 2013 will forever be reflected in the Internet DNA of the future, and how the cyber security market evolves to accommodate that future.
Chris Hinkley's picture
For security professionals, PCI DSS 3.0 means that PCI compliance will become more of an everyday business practice, rather than an annual checklist obligation.
Gant Redmon's picture
Proper use of Google Glass respecting law and privacy will be all about context. Context is different depending where you are. Are you in a public place, a private place, or a restricted place like a government installation?
Ram Mohan's picture
There is a lot we can do to keep our data private and, like many aspects of managing security, it’s a process that is best grounded in common sense. What can organizations do to shield themselves from the kind of scrutiny that has caught the world’s attention recently?
Michael Callahan's picture
There’s more than functionality and availability issues ailing There’s significant potential for compromise.
Gant Redmon's picture
In today's world, people are screaming “Privacy!” but it’s confusing who they’re screaming at. That’s why I thought I’d pen a timely guide to the current privacy outrage. Confusion stems from there being four plot lines going at the same time.