Data protection laws that demand explicit consent, right to be forgotten and algorithm transparency may have a chilling effect on artificial intelligence.
Telcos have their sights set on mining the rich data they gather from customers in order to increase revenues gathered by selling that data to media buyers. However, it’s an approach that they need to consider carefully. Increased regulation and scrutiny by authorities means that they can no longer simply use (or sell) consumer data in any way they see fit.
There is now a new breed of highly sophisticated cyber criminals who are attracted by the huge financial gains made possible by highly targeted ransomware attacks. Today, with IoT being adopted across a wide variety of industries, it seems that it’s only a matter of time before cyber criminals take Internet of Things (IoT) devices hostage using ransomware, potentially placing hundreds of thousands of people at risk. In this article, we examine the rising threat of ransomware, the potential impact on the IoT environment and how we can avoid a global ransomware pandemic.
The Data Privacy Asia 2016 Conference will feature top ranked industry experts from more than 15 countries and a more interactive audience experience than ever before. The Conference, which is themed Building Digital Trust: Establishing an Ecosystem of Trust and Protection in the Digital Age will examine subjects like trust vs. innovation and privacy vs. security, how enterprises can meet the challenges of a globally diverse regulatory and compliance landscape, and the privacy challenges on IT and security.
As personal data protection continue to challenge companies it is becoming apparent that the commissions and other structures that police these issues have become impatient with organisations that are not complying with recommendations. For the first time those companies which have suffered a data breach and been found not in compliance are feeling the wrath of governing bodies.
As the world becomes more complex non-traditional approaches to ensuring data security and protection must be evaluated. In this article Wei Chieh, the founder of SWARMNETICS draws a parallel between how we treat open source software and the Asian organisational attitude toward White Hat hackers (or ‘independent security researchers’) as assets that might help to stem the tide of security breaches that Asian companies face today.