Security Experts:

Privacy & Compliance
long dotted

NEWS & INDUSTRY UPDATES

An Amnesty International employee has been targeted with Israeli-made surveillance software, the human rights group said. [Read More]
Facebook, Google, Microsoft and Twitter unveiled the "Data Transfer Project" to make it easier for users to take their personal data and leave one online service for another. [Read More]
More than half of 500 federal employees surveyed admitted to experiencing a cybersecurity incident after implementing a new digital initiative, while almost half of those said that the incident delayed future innovation. [Read More]
A serious Bluetooth vulnerability can allow an attacker to monitor and manipulate traffic. Intel, Apple and Broadcom have already released patches [Read More]
NIST’s Computer Security Division decided to withdraw 11 outdated SP 800 publications on August 1, 2018 [Read More]
Integris Software, a Seattle-based provider of data privacy automation tools, today announced that it has raised $10 million through a Series A financing round led by Aspect Ventures. [Read More]
A-LIGN, a cybersecurity and compliance solutions provider, announced this week that it has raised $54.5 million from growth equity firm FTV Capital. [Read More]
The EU's proposed Cybersecurity Act (9350/18) was designed to give more authority, budget and responsibility to the European Union Agency for Network and Information Security (ENISA). [Read More]
US formally lifts a crippling ban on exports to China's ZTE, rescuing the smartphone maker from the brink of collapse after it was denied key components [Read More]
Britain's Information Commissioner's Office (ICO) plans to issue Facebook with the maximum available fine for breaches of the Data Protection Act -- an equivalent of $660,000 or 566,000 euros. [Read More]

FEATURES, INSIGHTS // Privacy & Compliance

rss icon

Mike Fleck's picture
Big companies can say they are GFPR compliant, but odds are their current structure will never allow them to find, identify, and categorize all the data that they have collected over time.
Lance Cottrell's picture
Even while using Tor hidden services, there are still many ways you can be exposed and have your activities compromised if you don’t take the right precautions.
Laurence Pitt's picture
Despite the long ramp-up towards the GDPR compliance deadline, the effects of the new regulations are still very much in infancy.
Travis Greene's picture
GDPR is proving disruptive for European citizens who are no longer able to interact with services from outside the EU. And the compliance costs can be significant as well. But are there legitimate concerns of overreach?
Bradon Rogers's picture
Complying with GDPR was the immediate challenge, but now there is an opportunity to capture the good work that has been done and make data protection a top of mind focus for enterprises every day.
Lance Cottrell's picture
Failing to consistently use identity hiding technologies is the most common way to blow your online cover. Just one failure to use your misattribution tools can instantly connect your alias to your real identity.
Josh Lefkowitz's picture
While the upcoming GDPR compliance deadline will mark an unprecedented milestone in security, it should also serve as a crucial reminder that compliance does not equal security.
Alastair Paterson's picture
With domain name WHOIS data subject to the GDPR’s privacy requirements, the system will “go dark” until alternative preparations are made, creating a challenge for this who fight computer fraud and other criminal activity on the Internet.
Preston Hogue's picture
With each new digital industry, process or service comes a new data source that can be compiled and cross referenced, introducing new ways to see into people’s lives, activities and business operations.
Marie Hattar's picture
GDPR is an opportunity to put in place measures that strengthen the overall security and compliance posture of organizations, using GDPR's requirements as the pivot point.