CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Blogs
Future of Privacy
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Future of Privacy

Exploring the future of privacy, blockchain, cryptocurrencies and more by B.J. Mendelson

B.J. Mendelson on stage giving presentation on how we can take back privacy
BlogsData PrivacyFuture of Privacy

B.J. Mendelson Talks About Your Privacy, and How to Get It Back

June 26, 2018
B.J. Mendelson discusses the Facebook antics, GDPR, and what people can do to protect their privacy now and moving into the future in his presentation at the campus of George Mason University in Virginia.
Read More
Photo of night market with colorful tents and retail shops
BlogsData PrivacyFuture of Privacy

Never Say Never: Your Data Is Yours, Get Paid for It

May 29, 2018
With high-profile scandals and the seemingly daily buzz of breaches, scams and exploits, it’s more and more obvious that the data points that make up your online profiles are a hot commodity. Time for the citizenry to take back their personal data and bring back responsibility into the ecosystem.
Read More
Image of man using his finger to select a person in a network showing how privacy might not be dead but may be difficult to get it back
BlogsData PrivacyFuture of Privacy

Your Privacy Might Not Be Dead, but How Can You Get It Back?

April 24, 2018
Corporations and governments have access to more of your personal information than ever. Just existing in the digital world leaves a footprint that can be used to track and market to you with, and more commonly, without your permission. But all is not lost in the fight for personal privacy.
Read More

Latest

KFC Drive thru at night showing ransomware attack

KFC, Pizza Hut, and Taco Bell Ransomware Attack Shuts Down 300 Restaurants in the UK

Exterior of T-Mobile store showing data breach

T-Mobile Data Breach: Hacker Accessed Personal Details of 37 Million Subscribers

Developer working on laptop showing software supply chain attacks

Why Securing Software Should Go Far Beyond Trusting Your Vendors

Lock on hard disk showing encryption key stolen for encrypted backups

Encrypted Backups, Encryption Key Stolen From GoTo in Hack

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results