Insights and opinions on data protection, privacy and cybersecurity contributed by thought leaders from around the world.
Predictive policing models have shown remarkable ability to help clamp down on illegal activity and reduce crime. But do these methods lead to systematic bias against certain minority communities or ethnic groups? IUPUI study based on real-world data shows there is no statistically significant evidence of racial bias.
Given a shortage of skilled cyber security manpower, one of the most attractive alternatives may be cyber security automation. In a new report from McAfee, 81% of those surveyed said they would be more successful in their jobs and have more time to focus on higher value-added tasks if they had greater automation.
Almost daily, we hear about another well-known company experiencing a data breach. While no set of steps can guarantee that your company will be 100 percent safe from hacking, implementing these steps will bolster your company’s security posture and help to protect the network from cyber-attacks.
The ransomware threat landscape continues to evolve and the spreading mechanism has changed, shifting from simple phishing attacks, spam and drive-by-downloads to more sophisticated techniques. These advanced techniques in ransomware has proven successful in massive global attacks for 2017. What's coming in 2018?
With the EU GDPR right around the corner, you have probably heard that there will be six legal bases for processing personal data. For organizations who are currently preparing for GDPR, there is a strong focus on – as well as some confusion around – legitimate interests, in particular. Let's take a closer look.
As prices of cryptocurrencies continue to skyrocket, fraudulent cryptocurrency scams are on the rise. Twitter cryptocurrency scams impersonating celebrities or influencers are so popular with cryptocurrency thieves and hackers simply because they are so easy to pull off on a daily basis.
The only guarantee today is that nefarious parties will continue to find new ways to infiltrate networks at financial institutions. Therefore, we must implement best practices to protect against cybersecurity incidents, as well as to resolve all possible issues that can arise should a cyberattack occur.
When consumers shop online many do not realize that they are not only handing over their hard-earned cash, there’s another transaction that is happening at the same time – online behavioral tracking. Data about you is being gathered, shared and analyzed to determine what you see and to shape your online experience.
Law enforcement agencies around the world are embracing new predictive policing technology that will help them spot criminals before a crime ever takes place. However, communities often have little or no idea of why or how this technology is being used, and that raises some important privacy and human rights concerns.
The bubble in cyber security jobs is encouraging people to look for better opportunities at exactly the wrong time, and that may lead to the detriment of the fight against cyber crime. A new report by (ISC)2 found that a staggering 84% of cyber workers are open to new opportunities or plan to change employers in 2018.