Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Apple will begin spelling out what kinds of personal information is being collected by the digital services displayed in its app stores for iPhones and other Apple products. [Read More]
Google has hired Goldman Sach veteran Phil Venables to manage risk for the Google Cloud product lines. [Read More]
Spotify has started informing users that their personal information might have been inadvertently shared with some of the company’s business partners. [Read More]
France's CNIL data privacy watchdog slapped 135 million euros in fines on US tech titans Google and Amazon for placing advertising cookies on users' computers without consent. [Read More]
The new financing round was led by Canvas Ventures. Previously, Skyflow raised $7.5 million in a seed round led by Foundation Capital. [Read More]
Apple is stepping up privacy for app users, forcing developers to be more transparent about data collection and warning they could be removed if they don't comply with a new anti-tracking measure. [Read More]
The US Treasury has extended by seven days the November 27 deadline given to the Chinese owner of TikTok to sell the popular social media platform's American business. [Read More]
The European Union is laying out new standards for data giving Europeans more control over their personal information as it seeks to counter the power of U.S. and Chinese tech companies. [Read More]
Google faces fresh regulatory scrutiny in Britain over plans to revamp its ad data system, after an industry lobbying group complained to the competition watchdog that the changes would cement the U.S. tech giant’s online dominance. [Read More]
Cybersecurity solutions provider Trend Micro this week announced the release of a free tool designed to help users boost their privacy online and fight misinformation. [Read More]

FEATURES, INSIGHTS // Privacy

rss icon

Laurence Pitt's picture
ePrivacy takes GDPR's approach a step further by ensuring personal and family privacy in relation to data collection, storage and usage.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Lance Cottrell's picture
Even while using Tor hidden services, there are still many ways you can be exposed and have your activities compromised if you don’t take the right precautions.
Travis Greene's picture
GDPR is proving disruptive for European citizens who are no longer able to interact with services from outside the EU. And the compliance costs can be significant as well. But are there legitimate concerns of overreach?
Lance Cottrell's picture
Failing to consistently use identity hiding technologies is the most common way to blow your online cover. Just one failure to use your misattribution tools can instantly connect your alias to your real identity.
Preston Hogue's picture
With each new digital industry, process or service comes a new data source that can be compiled and cross referenced, introducing new ways to see into people’s lives, activities and business operations.
Lance Cottrell's picture
Facial recognition systems are becoming cheaper, better, easier to use, and more widely deployed, while social media platforms are creating an ocean of easily identifiable faces that are widely accessible.
Steven Grossman's picture
How can a company protect its information and operations without running askew of data privacy laws and the concerns of its customers?
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.
Lance Cottrell's picture
By surreptitiously monitoring and engaging with potential attackers and malware developers you can successfully gain information about emerging attack methods, patterns, and practices in the cyber underground.