Security Experts:

Privacy & Compliance
long dotted

NEWS & INDUSTRY UPDATES

Members of the Tor community have raised $86,081 as part of an initiative aimed at securing funds to find and squash bugs in the popular browser. [Read More]
A publicly accessible, unprotected database belonging to car dealership marketing firm Dealer Leads was found to expose 198 million records, including personally identifiable information. [Read More]
IBM launches z15 mainframe with new capabilities designed to protect sensitive data across hybrid multi-cloud environments. [Read More]
President Benjamin Netanyahu on Thursday denied a media report that Israel spied on cell phones in the vicinity of the White House -- and President Donald Trump said he believed him. [Read More]
An analysis of Android flashlight apps available in Google Play reveals that they request an average of 25 permissions, with some requesting up to 77 permissions when installed. [Read More]
In an attempt to improve the privacy and security of its users, Google is getting ready to bring DNS-over-HTTPS (DoH) to the Chrome browser. [Read More]
Telegram was found to breach users’ privacy by failing to remove images from a device’s local storage when the sender selects to delete them for all recipients. [Read More]
Vulnerabilities discovered by a researcher in Verizon Wireless systems could have been exploited to access 2 million customer contracts. [Read More]
A small fine of $20,000 in Sweden highlights a potential problem for the use of biometrics in security throughout Europe, including American firms with offices in Europe. [Read More]
The Australian Tide Foundation has announced details of a distributed ledger technology (DLT) password protection system using 'splintering' to deliver password security that is massively greater than the traditional central hashed database. [Read More]

FEATURES, INSIGHTS // Privacy & Compliance

rss icon

Alastair Paterson's picture
For companies based in the U.S. with customers and files in many different countries, reconciling conflicting practices and laws is likely to remain a serious headache for years to come.
Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Josh Lefkowitz's picture
Regardless of which framework you use, it’s crucial to operationalize it in the context of your organization’s unique environment and risk factors.
Laurence Pitt's picture
In the coming years the data protection and privacy landscape will change dramatically, improving the experience for us as individuals but potentially making things more complex for businesses.
Alastair Paterson's picture
With more legislation expected, every company should ensure they have a robust framework in place along with strong data mapping capabilities.
Torsten George's picture
By implementing the core pillars of GDPR, organizations can assure they meet the mandate’s requirements while strengthening their cyber security posture.
Preston Hogue's picture
You should be asking yourself what your digital vapor trail says about you and its potential impact on your own reputation and the trust others have in you.
Preston Hogue's picture
In the United States, it is consumers’ responsibility to opt out of sharing their information with the services they join—and figuring out how to do so.
Preston Hogue's picture
There have been so many high-profile breaches that a person’s entire life could be laid out, triangulated and, ultimately, faked by someone with the wrong set of intentions.