newsTor browser, Tails OS merge to offer users improved security and privacyPlatforms hope by combining, their reach can be expanded, and that the merger ‘will strengthen both organizations' ability to protect people worldwide from surveillance and censorship’.By Howard Solomon30 Sep 20244 minsBrowser SecurityInternet SecurityPrivacy analysis The 18 biggest data breaches of the 21st centuryBy Michael Hill, Dan Swinhoe and John Leyden12 Sep 202418 minsData BreachPhishingRSA Conferencenews AT&T confirms arrest in data breach of more than 110 million customersBy Evan Schuman12 Jul 20246 minsData BreachCyberattacksPrivacy newsMobile surveillance software firm mSpy suffers data breachBy John Leyden 12 Jul 20244 minsData BreachPrivacy featureWhat is Tor Browser? Software for protecting your identity onlineBy J.M. Porup 14 Jun 202412 minsInternetPrivacySecurity news analysisWindows Recall — a ‘privacy nightmare’?By Matthew Finnegan 24 May 20241 minPrivacy featureGeneral Data Protection Regulation (GDPR): What you need to know to stay compliantBy Michael Nadeau 04 Apr 202421 minsComplianceData and Information SecurityPrivacy opinionIs privacy being traded away in the name of innovation and security?By Christopher Burgess 12 Feb 20246 minsGenerative AIPrivacySecurity Practices newsFacebook tops security ratings among social networksBy Jon Gold 07 Nov 20233 minsInternet SecurityIdentity and Access ManagementPrivacy ArticlesnewsOnline Safety Bill passes final parliament debate, set to become UK lawDespite widespread criticism and scrutiny, the UK government is within touching distance of delivering its controversial new internet safety rules.By Michael Hill 20 Sep 2023 3 minsEncryptionCompliancePrivacynews analysisFTC files lawsuit against Kochava for harvesting and selling geolocation dataThe lawsuit claims the data broker is putting people at risk of "stigma, stalking, discrimination, job loss, and even physical violence” through the sale of geolocation data. By Christopher Burgess 30 Aug 2022 5 minsPrivacynews analysisFTC begins sweeping commercial surveillance and lax data security rulemaking processWhile some praise the FTC's efforts, some in Congress worry that it overlaps with and possibly jeopardizes the passing of the American Data Privacy and Protection Act.By Cynthia Brumfield 11 Aug 2022 8 minsData PrivacyPrivacyopinionHiQ v LinkedIn court ruling will have a material effect on privacyA U.S. appeals court has ruled that hiQ's scraping of public LinkedIn data is not a violation of the U.S. Computer Fraud and Abuse Act.By Christopher Burgess 01 Jun 2022 5 minsCSO and CISOData PrivacyPrivacynews analysisData protection concerns spike as states get ready to outlaw abortionThe use of personal data from brokers, apps, smartphones, and browsers to identify those seeking an abortion raises new data protection and privacy risks.By Cynthia Brumfield 23 May 2022 9 minsData PrivacyPrivacyfeatureHow GDPR has inspired a global arms race on privacy regulationsCompanies with a global presence face the challenge of achieving compliance with an increasing array of regional data-protection regulations.By Rosalyn Page 07 Apr 2022 8 minsRegulationData PrivacyPrivacynews analysisWhat will the Australian privacy law review deliver?A looming federal election brings uncertainty over the Australian privacy law review and questions about whether new regulations will align with Europe’s GDPR.By Rosalyn Page 03 Apr 2022 8 minsRegulationData PrivacyPrivacyfeatureThe state of privacy regulations across AsiaWhile GDPR looms large across the Asia-Pacific region, there are significant differences as jurisdictions develop their own national approaches to privacy. There’s also a growing focus on data security in many countries.By Rosalyn Page 03 Apr 2022 9 minsRegulationData PrivacyPrivacynews analysisAustralian CISOs continue to struggle on privacyNew ISACA research shows that Australian organisations—including regulators—can’t find sufficient staff to treat privacy by design as seriously and thoroughly as needed.By David Braue 30 Mar 2022 6 minsPrivacynews analysis4 alternatives to encryption backdoors, but no silver bulletAlternatives to backdoors in end-to-end encryption exist, but not all address privacy and security concerns, say experts at last week’s Enigma conference.By Cynthia Brumfield 08 Feb 2022 7 minsEncryptionPrivacyfeatureTop 8 cybersecurity predictions for 2022Seeing opportunities in the mass move to remote work, cyberattackers are updating their tactics, compelling security leaders to respond. Experts make their predictions about threat reduction, compliance, supply chain management, security spending and more.By Shweta Sharma 06 Jan 2022 6 minsMalwareThreat and Vulnerability ManagementCompliancefeatureCyber insurance explained and why you need itCyber insurance can't protect your organization from cybercrime, but it can keep your business on stable financial footing should a significant security event occur.By Michael Hill 01 Dec 2021 9 minsData BreachCybercrimePrivacy Show more Show less View all Resources whitepaper Efficiency Evolution: Enhancing SLED Operations and Security with Managed Services Learn how managed services can help state, local, and education (SLED) organizations improve their operations and security while enabling them to innovate and serve their communities better. The post Efficiency Evolution: Enhancing SLED Operations and Security with Managed Services appeared first on Whitepaper Repository –. By Tanium Inc 18 Oct 2024IT OperationsRisk ManagementSecurity whitepaper Leveraging Tanium-powered managed services in your organization By Tanium Inc 18 Oct 2024Managed IT ServicesRisk ManagementSecurity whitepaper 3 Ways to Automate and Optimize Field Service Management By ServiceNow 18 Oct 2024Artificial IntelligenceBusiness OperationsService Management Software View all Video on demand videoAligning security, compliance and privacy across inventory trackingBrad Wells, Executive Director, Information Security, and Kandice Samuelson, Senior Director, IT Governance at PPD lead a team enhancing PPD’s inventory tracking system that identifies PPD’s most valuable assets. Join us to learn how they distribute security resources for appropriate levels of protection, maintain compliance with government regulations and industry standards, and leverage information security controls aligned with client requirements, industry frameworks and privacy regulations. 28 May 2021 20 minsComplianceData and Information SecurityPrivacy How the California Consumer Privacy Act (CCPA) will affect you and your business | TECH(talk) 06 Sep 2019 23 minsData PrivacyGDPRGovernment 6 security reasons to upgrade to Windows 10 25 Jul 2018 1 minsApplication SecurityPrivacyWindows Prepping for GDPR 18 May 2018 36 minsRegulationPrivacySecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos opinion 3 key considerations when evaluating GenAI solutions for cybersecurity By Steven Sim 18 Oct 20245 mins Generative AISecurity news The Google Meet error you last saw could be someone trying to hack your system By Shweta Sharma 18 Oct 20243 mins MalwareSecurity news Microsoft fails to collect critical security logs, exposing customers to risks By Gyana Swain 18 Oct 20246 mins VulnerabilitiesSecurity podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: New World Development’s Dicky Wong on securing critical infrastructure 16 Oct 202412 mins Critical InfrastructureSecurity video CSO Executive Sessions: DocDoc’s Rubaiyyaat Aakbar on security technology 12 Sep 202419 mins Healthcare IndustryArtificial IntelligenceSecurity video CSO Executive Sessions: Hong Kong Baptist University’s Allan Wong on security leadership 05 Sep 202410 mins Education IndustryIT Leadership