Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Versa Networks this week announced it raised $84 million in Series D funding. To date, the company has received $196 million in funding. [Read More]
Texas-based asset management startup Sevco Security has raised $15 million in Series A funding led by SYN Ventures. [Read More]
Federal law enforcement agencies secretly seek the data of Microsoft customers thousands of times a year, according to congressional testimony by a senior executive. [Read More]
Big Blue contributes the Kestrel open-source programming language, which is aimed at Security Operations Center (SOC) analysts and other cybersecurity professionals. [Read More]
The company will use the funds to further grow its IPGE (Identity, Privacy, Governance and Exchange) platform. [Read More]
Microsoft is investigating an incident where a threat actor submitted malicious drivers for certification through its Windows Hardware Compatibility Program. [Read More]
Amazon's AWS subsidiary has snapped up Wickr, a late-stage provider of encrypted communications technology. [Read More]
The update makes sharing links for some Google Drive files more secure and will require attention from Google Workspace admins. [Read More]
A Dutch consumer group is launching a 1.5 billion euro ($1.8 billion) claim against TikTok over what it alleges is unlawful harvesting of personal data from users of the popular video sharing platform. [Read More]
Google said Thursday June 24, 2021, it's delaying plans to phase out Chrome browser technology that tracks users for ad purposes because it needs more time to develop a replacement system. [Read More]

FEATURES, INSIGHTS // Privacy

rss icon

Preston Hogue's picture
It’s a good reminder that communications in cyberspace can have a long shelf life that both individuals and organizations would be wise to consider.
Laurence Pitt's picture
ePrivacy takes GDPR's approach a step further by ensuring personal and family privacy in relation to data collection, storage and usage.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Lance Cottrell's picture
Even while using Tor hidden services, there are still many ways you can be exposed and have your activities compromised if you don’t take the right precautions.
Travis Greene's picture
GDPR is proving disruptive for European citizens who are no longer able to interact with services from outside the EU. And the compliance costs can be significant as well. But are there legitimate concerns of overreach?
Lance Cottrell's picture
Failing to consistently use identity hiding technologies is the most common way to blow your online cover. Just one failure to use your misattribution tools can instantly connect your alias to your real identity.
Preston Hogue's picture
With each new digital industry, process or service comes a new data source that can be compiled and cross referenced, introducing new ways to see into people’s lives, activities and business operations.
Lance Cottrell's picture
Facial recognition systems are becoming cheaper, better, easier to use, and more widely deployed, while social media platforms are creating an ocean of easily identifiable faces that are widely accessible.
Steven Grossman's picture
How can a company protect its information and operations without running askew of data privacy laws and the concerns of its customers?
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.