CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
James Keenan
Automation and Anonymity Evangelist at Smartproxy
The automation and anonymity evangelist at Smartproxy. He believes in data freedom and everyone’s right to become a self-starter. James is here to share knowledge and help you succeed with residential proxies.


Man coding on laptop showing the implication of HiQ vs. LinkedIn case on automated web scraping
Data PrivacyInsights

What the HiQ vs. LinkedIn Case Means for Automated Web Scraping

December 26, 2019
LinkedIn has taken actions to terminate accounts suspected of web scraping however data analytics firm HiQ said the data was fair game for scraping. Where does the line between public and private data lies?
Read More

Latest

Access granted screen on monitor showing data breach

Education Giant Pearson Confirms Customer Data Breach After Cyber Attack

Mechanical bug on keyboard showing vulnerability database

EU Launches Government-Backed Vulnerability Database as CVE Alternative

Stack of golden Monero coins showing ban on privacy coins and anonymous crypto accounts

EU Looks to Ban Privacy Coins and Anonymous Crypto Accounts by 2027

Keyboard with dollar bill showing ransom payment and cyber extortion

PowerSchool Confirms Ongoing Cyber Extortion of Individual Schools Despite Ransom Payment

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results