Security Experts:

Privacy & Compliance
long dotted

NEWS & INDUSTRY UPDATES

Dig Security’s latest financing comes as venture capital investors rush to place bets on startups jostling for space in the cloud data security space. [Read More]
Microsoft says its security teams have detected zero-day exploitation of a critical vulnerability in its flagship Windows platform. [Read More]
Adobe has rolled out security fixes for at least 63 security vulnerabilities in a wide range of widely deployed Windows and macOS software products. [Read More]
Twitter's former security chief, Peiter Zatko said he tried to alert management to grave vulnerabilities to hacking or data theft, to no avail. [Read More]
Israeli startup Opus Security has banked $10 million in seed round funding to build technology for cloud security orchestration and remediation. [Read More]
Apple acknowledged the macOS zero-days in an advisory but did not share technical details or indicators of compromise to help defenders hunt for signs of infections. [Read More]
Microsoft security teams share details on ransomware attacks linked to DEV-0270, a subgroup of Iran-linked Phosphorus. [Read More]
The U.S. government's CISA, NSA, and ODNI have released the first part of a three-part joint guidance series on securing the software supply chain. [Read More]
The latest funding was led by CIBC Innovation Banking and brings the total raised by the Maryland start-up to $100 million. [Read More]
Security researchers at Rapid7 discover multiple vulnerabilities in Sigma Spectrum infusion pump battery units, including the storing of WiFi credentials on non-volatile memory. [Read More]

FEATURES, INSIGHTS // Privacy & Compliance

rss icon

Preston Hogue's picture
You should be asking yourself what your digital vapor trail says about you and its potential impact on your own reputation and the trust others have in you.
Preston Hogue's picture
In the United States, it is consumers’ responsibility to opt out of sharing their information with the services they join—and figuring out how to do so.
Preston Hogue's picture
There have been so many high-profile breaches that a person’s entire life could be laid out, triangulated and, ultimately, faked by someone with the wrong set of intentions.
Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Ashley Arbuckle's picture
Ashley Arbuckle interviews Michelle Dennedy, Cisco’s Chief Privacy Officer (CPO), to discuss how data privacy has a major impact on business.
Preston Hogue's picture
It’s a good reminder that communications in cyberspace can have a long shelf life that both individuals and organizations would be wise to consider.
Laurence Pitt's picture
ePrivacy takes GDPR's approach a step further by ensuring personal and family privacy in relation to data collection, storage and usage.
Justin Fier's picture
Over time, holding people responsible will lead individuals to see how their actions impact the security of the organization and come to consider themselves responsible for the security of the company.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Mike Fleck's picture
GDPR is a regulation-based initiative that will influence the development of information technology over the next decade.