Use of facial recognition technology is growing in both public and private sectors amid increasing concerns over data privacy and mass surveillance. Read More
With many security communities providing information sharing, how should cybersecurity professionals in the healthcare industry choose to ensure their community time is well-spent? Read More
The surveillance concerns surrounding TikTok are legitimate, yet they are no more legitimate than the spyware potential of countless Chinese IoT devices. Read More
Technology should provide us with the tools we need to feel in control of our personal data, not the opposite. Is there any technology available that can actually stop the companies from making money out of our data? Read More
The goal for stepping up WFH data governance isn’t simply compliance but to go forward with policies and procedures that enable better results and build brand trust with consumers, business partners and others. Read More
As location-based services become ubiquitous and the rise of selfie soldiers, the Strava heat map incident shows the difficulty in governing civilian technology in military settings. Read More
Legacy applications are a common unknown for enterprises and represent an attack surface of customer data endpoints which could put their data at risk. Do you know how to find them to prevent data breaches? Read More
To prepare for any privacy regulation, adopt a core technical framework where privacy controls can be applied to any new or existing system. Read More
As stay-at-home restrictions start to loosen with COVID-19 cases declining, the office reopening is going to bring an increase in cybersecurity risks that companies should be prepared for. Read More
The role of the CISO is becoming more vital to companies of all types on a global scale. Aside from being an executive-level role, the CISO must possess the necessary skills to unite multiple aspects of the business into one secure, digital front. Read More