Insights and opinions on data protection, privacy and cybersecurity contributed by thought leaders from around the world.
Increased credit card usage has resulted in higher rates of credit card fraud, and financial institutions are bearing the brunt of the financial losses. Recently, fraudsters are committing synthetic identity fraud by cultivating identities and developing credit histories over time leading to the call for new solutions.
While the Facebook Cambridge Analytica scandal has created its share of problems for Facebook, it’s clear that the scale and scope of the scandal extends to every corner of Silicon Valley. After all, most tech giants are collecting staggering amounts of user data and comprehensive new privacy regulations seem imminent.
In the aftermath of the Cambridge Analytica scandal, many have suggested that Facebook be regulated, fined and perhaps even broken up. After all, if the FTC were to invoke its full power, it could theoretically levy hundreds of millions of dollars of fines, crippling Facebook. But is a big tech company too big to fail?
Out of all six legal bases for processing offered by the GDPR, consent and legitimate interests are the legal bases most likely to be relied upon to justify direct marketing. Where the direct marketing involves electronic communications, however, is where things get muddy.
A Security Information and Event Management (SIEM) can play an important role in GDPR compliance. It can serve as a centralized point for all data collection and analysis, and offer intelligent insights into malicious behavior so you can be alerted of security incidents before they become an impactful data breach.
Is facial recognition software secure by design? A question rarely asked is “how safe is the infrastructure that holds and processes all this data?” As long as organizations refuse to audit the security of their suppliers, facial recognition software will remain inherently unsafe, especially in the hands of the police.
The congressional testimony was supposed to establish a national debate about data privacy and the right of users to protect their data from being sold, used, or analyzed in ways that were never intended. Instead, it has become very clear that regulating privacy is harder than anyone originally expected.
Making educated decisions about cyber security requires high-quality information. Analyst firms are happy to provide information. But is the information they provide genuinely useful? Are they adding value to the conversation? Ultimately, great leadership, thoughtful strategy and superior execution is key to success.
As the technologies for gathering, analysing, and acting on information become increasingly powerful, we find ourselves facing a tipping point as we consider the impact of data-driven processes on the ethics in information management and the challenges of managing data privacy.
By now, it’s safe to assume that everyone’s personal information has been compromised in some way. The digital nature of our world come with risks and since the cyberthreats facing us all extend beyond the four walls of the workplace, so should our cybersecurity efforts.