Security Experts:

Privacy & Compliance
long dotted

NEWS & INDUSTRY UPDATES

Texas startup Balkan ID banks $5.75 million in seed funding to help organizations find and remediate risky privileges across SaaS and public cloud infrastructure. [Read More]
Russia's government has put forward a law to force ride-hailing apps to give the FSB intelligence agency real-time access to their data. [Read More]
Over the last 24 hours, two Silicon Valley startups jostling for space in the corporate email security market raised venture capital funding at a combined valuation of $5.1 billion. [Read More]
Microsoft patches at least 73 documented security flaws in the Windows ecosystem and warned that unknown attackers are already launching zero-day man-in-the-middle attacks. [Read More]
Adobe ships patches for at least 18 serious security defects in multiple enterprise-facing products and warned that unpatched systems are at risk of remote code execution attacks [Read More]
Startup Clearview AI has agreed to limit access to its controversial facial recognition database in the United States, settling a lawsuit filed by privacy advocates, a court filing showed. [Read More]
One year after the cyberattack, the US Department of Transportation has proposed a fine of nearly $1 million to Colonial Pipeline over control room management failures. [Read More]
By the end of 2023, GitHub will mandate that all code contributors secure their computers with at least one form of two-factor authentication (2FA) account protection. [Read More]
The U.S. government is barreling ahead with plans to mitigate future threats from quantum computing with a new White House memo directing federal agencies to jumpstart an all-hands-on-deck approach to migrating to quantum-resistant technologies. [Read More]
The European Parliament voted to hand the EU's police agency new powers to gather and use data, provoking an angry response from privacy activists. [Read More]

FEATURES, INSIGHTS // Privacy & Compliance

rss icon

Gordon Lawson's picture
While obscurity is an offensive tool for attackers, it also represents a defensive measure for organizations. Let’s consider the benefits of concealing network infrastructure and activity from the outside world to reduce the enterprise attack surface.
Preston Hogue's picture
There is a dawning realization of the potential danger posed by algorithms, written by humans to steer other humans.
Preston Hogue's picture
Everywhere you go, you cast a shadow of data that, taken together, reveals who you are, what you like to do, your habits, your addictions.
Alastair Paterson's picture
For companies based in the U.S. with customers and files in many different countries, reconciling conflicting practices and laws is likely to remain a serious headache for years to come.
Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Josh Lefkowitz's picture
Regardless of which framework you use, it’s crucial to operationalize it in the context of your organization’s unique environment and risk factors.
Laurence Pitt's picture
In the coming years the data protection and privacy landscape will change dramatically, improving the experience for us as individuals but potentially making things more complex for businesses.
Alastair Paterson's picture
With more legislation expected, every company should ensure they have a robust framework in place along with strong data mapping capabilities.
Torsten George's picture
By implementing the core pillars of GDPR, organizations can assure they meet the mandate’s requirements while strengthening their cyber security posture.