Marriott has put half a billion guest at risk in one of the largest data breach to date. The scope of the data breach is not only startling due to the numbers of guests that have been affected, it is the sheer amount of time since 2014 that the hackers had had access to the data.
The Five Eyes proposal for lawful access compromises on encryption, infringes upon our right to privacy, puts our personal data at risk, and utlimately undermines public trust in technology.
The Five Eyes has put the tech industry on notice. They want access to data from tech companies and while there is no formal demand for encryption backdoors, the Five Eyes believe government agencies should have access to encrypted information.
Secure messaging apps can provide a great means of communicating securely and privately, but there's a privacy dilemma as law enforcement and national security agencies face significant obstacles to the lawful access of communications.
Are the privacy and data misuse scandals finally catching up with Facebook stock? There are lessons every business should heed to avoid a direct and shocking blow to company value.
Proposed Secure Data Act wants to forbid government agencies from demanding for encryption backdoors. This is a positive move but will it resolve the security vs. privacy debate?
Today’s heightened threat level imposes responsibilities on both sides of the equation: Cloud service providers must continually evaluate their security posture to offer rigorous protection to customers. And leaders protecting their organization must choose the solution that best meets their unique security needs.
There is reason to be optimistic about the future of cyber security. In today’s world, there is always a “weak link” in the chain that hackers can exploit. In a blockchain world, there are no longer any weak links and every action taken on the blockchain is part of a completely verifiable and trackable digital ledger.
There's a need to secure offline, rather than online, microfinancing solutions. The future rests in the power of embeddable microchips and the power of process isolation by inserting a Linux-powered computer into the architecture of an non-secure IoT device to create a hardware Root of Trust.
Why the End of Net Neutrality and the Demise of the Open Internet Could Have Unintended Consequences…
The FCC’s historic overturning of the Obama-era Net Neutrality rules could have profound implications for the Open Internet. While there are potential censorship and service pricing implications of this move, what are the long-term impact on data privacy and cyber security?