Security Experts:

Privacy & Compliance
long dotted

NEWS & INDUSTRY UPDATES

Twitter and Facebook suspend accounts believed to be part of a Chinese government influence campaign targeting Hong Kong protests. [Read More]
Facebook announces that its Data Abuse Bounty program now includes Instagram, and the company has invited some security researchers to test Instagram’s new Checkout feature. [Read More]
Researchers discovered that organizations expose many confidential documents by uploading them to malware analysis sandboxes. [Read More]
Uganda and Zambia have denied a report that employees of Chinese telecom giant Huawei had helped them spy on political opponents. [Read More]
Apple files copyright infringement lawsuit against Corellium for creating replicas of iOS that can be used as a security research tool for discovering vulnerabilities. [Read More]
Uganda denies a report that employees of Chinese telecom giant Huawei had aided a domestic spying operation targeting pop star turned opposition icon Bobi Wine. [Read More]
A survey of over 2,000 Americans shows that cybersecurity has become a political issue and most believe that cybersecurity should be a top priority for the government. [Read More]
Facebook has paid hundreds of contractors to listen to and transcribe snippets of users' conversations, US media reported on Tuesday, amid heightened scrutiny of the social network's data collection practices. [Read More]
The FBI is looking for outside contractors to monitor social media for potential threats, setting up a possible conflict with Facebook and other companies over privacy. [Read More]
Securit.ai has emerged from stealth with $31 million in funding to launch its platform that uses artificial intelligence to understand the nature and use of companies' stored personal data. [Read More]

FEATURES, INSIGHTS // Privacy & Compliance

rss icon

Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Josh Lefkowitz's picture
Regardless of which framework you use, it’s crucial to operationalize it in the context of your organization’s unique environment and risk factors.
Laurence Pitt's picture
In the coming years the data protection and privacy landscape will change dramatically, improving the experience for us as individuals but potentially making things more complex for businesses.
Alastair Paterson's picture
With more legislation expected, every company should ensure they have a robust framework in place along with strong data mapping capabilities.
Torsten George's picture
By implementing the core pillars of GDPR, organizations can assure they meet the mandate’s requirements while strengthening their cyber security posture.
Preston Hogue's picture
You should be asking yourself what your digital vapor trail says about you and its potential impact on your own reputation and the trust others have in you.
Preston Hogue's picture
In the United States, it is consumers’ responsibility to opt out of sharing their information with the services they join—and figuring out how to do so.
Preston Hogue's picture
There have been so many high-profile breaches that a person’s entire life could be laid out, triangulated and, ultimately, faked by someone with the wrong set of intentions.
Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.