Security Experts:

Privacy & Compliance
long dotted

NEWS & INDUSTRY UPDATES

Proofpoint warns that attackers are leveraging compromised supplier accounts and supplier impersonation to send malware, steal credentials and perpetrate invoicing fraud. [Read More]
Facebook said Tuesday that hackers "scraped" personal data of some half-billion users back in 2019 by taking advantage of a feature designed to help people easily find friends using contact lists. [Read More]
In a new pilot program, the U.S. DoD invites the HackerOne community to remotely test the participating DoD contractors’ assets and report on any identified vulnerabilities. [Read More]
A bipartisan group of US senators sent letters to digital ad exchanges, including Google and Twitter, asking whether user data was sold to foreign entities who could use it for blackmail or other malicious ends. [Read More]
A third-party audit financed by the New York Times discovers a high-risk vulnerability but overall gives Securedrop Workstation a positive security bill of health. [Read More]
The U.S. Department of Homeland Security's CISA is directing federal agencies to scan their Microsoft Exchange environments for four weeks and report if they find any compromised servers. [Read More]
The sensitive information of over 235 million customers of EU mobile providers could be at risk due to website vulnerabilities. [Read More]
The Dutch Data Protection Authority has fined Booking.com half a million dollars for not reporting a 2018 data breach within the required 72 hours. [Read More]
A serious security bug in the 'netmask' npm package leads to misinterpretation of IP addresses. [Read More]
CompuCom shares information on the cost of recovering from a cybersecurity incident, including loss of revenue and major service disruptions. [Read More]

FEATURES, INSIGHTS // Privacy & Compliance

rss icon

Preston Hogue's picture
There is a dawning realization of the potential danger posed by algorithms, written by humans to steer other humans.
Preston Hogue's picture
Everywhere you go, you cast a shadow of data that, taken together, reveals who you are, what you like to do, your habits, your addictions.
Alastair Paterson's picture
For companies based in the U.S. with customers and files in many different countries, reconciling conflicting practices and laws is likely to remain a serious headache for years to come.
Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Josh Lefkowitz's picture
Regardless of which framework you use, it’s crucial to operationalize it in the context of your organization’s unique environment and risk factors.
Laurence Pitt's picture
In the coming years the data protection and privacy landscape will change dramatically, improving the experience for us as individuals but potentially making things more complex for businesses.
Alastair Paterson's picture
With more legislation expected, every company should ensure they have a robust framework in place along with strong data mapping capabilities.
Torsten George's picture
By implementing the core pillars of GDPR, organizations can assure they meet the mandate’s requirements while strengthening their cyber security posture.
Preston Hogue's picture
You should be asking yourself what your digital vapor trail says about you and its potential impact on your own reputation and the trust others have in you.