Cyber SecurityInsightsInternet of Medical Threats? Exploring Bluetooth Low Energy Vulnerabilities in Medical Devices
Hackers Reportedly Exploited Wiseasy’s Remote Control Dashboards to Compromise 140,000 Payment Terminals Worldwide
Tens of Thousands of GitHub Code Repositories Cloned With Malicious Code Added; Hacker Claims Campaign Was Elaborate Bug Bounty Effort
Cyber SecurityInsightsThe USA PATRIOT Act: How CPOs Can Adopt a Privacy-First Approach To Secure Data Collaboration
Cyber SecurityNewsIdentity Management Firm Entrust Suffers a Security Breach, Ransomware Gang Obtains Files
Data PrivacyNewsPaypal, Yahoo, Other Popular Sites Blocked as Indonesian Internet Regulation Goes Into Effect
Mozilla: Apple “Private Click Management” Not a Net Positive for Consumers, Safari Privacy Can Still Be Compromised by Cross-site Tracking
The Secret To Earning Your Customers’ Trust May Lie in Giving Them More Control Over Their Personal Information
Data ProtectionNewsAfter Pushback From Big Tech Companies, India Scraps Personal Data Protection Bill and Starts Over
Google Account Signup Process Target of New Privacy Complaint From Consumer Groups; Language, Prompts Called Confusing and Misleading
Terms of UK Data Protection Act Reform Take Shape as DCMS Publishes Response to Consultation Proposals
US Chamber of Commerce Opposes “Unworkable” Federal Privacy Law Despite Popular Support, Cites Override of State Law and Right to Private Action
Cyber SecurityNewsNHS 111 System Experiencing Disruption Due to Cyber Attack, System Outage May Impact Services for Several Days
Quantum Computing Threat Treated With Increasing Seriousness by Federal Government With Announcement of New Cryptographic Standards and Tools