Russia’s Privacy Rules Stifle Dissent

The Russian Federation’s creation and manipulation of privacy rules, regulations and laws continues apace with the unstated but clear intent to allow the government to stifle voices of dissent. To that end, we have seen the Federal Service for Oversig… Continue reading Russia’s Privacy Rules Stifle Dissent

Data Poisoning: When Attackers Turn AI and ML Against You

Stopping ransomware has become a priority for many organizations. So, they are turning to artificial intelligence (AI) and machine learning (ML) as their defenses of choice. However, threat actors are also turning to AI and ML to launch their attacks. One specific type of attack, data poisoning, takes advantage of this. Why AI and ML Are at […]

The post Data Poisoning: When Attackers Turn AI and ML Against You appeared first on Security Intelligence.

Continue reading Data Poisoning: When Attackers Turn AI and ML Against You

How to Communicate Your Security and Compliance Posture to Build Trust With Customers

Do your customers know about your compliance efforts and trust your organization’s ability to keep their data safe? …
Read More
The post How to Communicate Your Security and Compliance Posture to Build Trust With Customers appeared first on Hyperpro… Continue reading How to Communicate Your Security and Compliance Posture to Build Trust With Customers

Clubhouse Exclusivity Applies to Membership, Not Data

There’s a certain irony that an invitation-only social media platform would find a hacker posted data on 1.3 million of its users on an online forum. But that’s exactly where Clubhouse found itself over the weekend; proffering by way of explanation th… Continue reading Clubhouse Exclusivity Applies to Membership, Not Data

Don’t Stop At ‘Delete:’ How Privacy Needs Are Shaping Data Destruction

It’s just part of the job: at some point in a device’s lifecycle, data must be destroyed. While deleting files may mean users and apps can’t access them, simple deletion isn’t enough to truly destroy the data. To be most effective, secure data destruction has to be complete. This is especially true when your organization […]

The post Don’t Stop At ‘Delete:’ How Privacy Needs Are Shaping Data Destruction appeared first on Security Intelligence.

Continue reading Don’t Stop At ‘Delete:’ How Privacy Needs Are Shaping Data Destruction

European telcos inadvertently expose sensitive customer data to over-sharing and theft

 
The post European telcos inadvertently expose sensitive customer data to over-sharing and theft appeared first on Security Boulevard.
Continue reading European telcos inadvertently expose sensitive customer data to over-sharing and theft

Virginia Enacts New Data Privacy Law

On March 2, 2021, Virginia Governor Ralph Northam signed the Commonwealth’s first comprehensive data privacy law, the Consumer Data Protection Act, making Virginia the second state, after California, to do so. California’s Consumer Privacy Act, … Continue reading Virginia Enacts New Data Privacy Law

Web Application Firewalls Instrumental in Digital-First Banking

Like many industries, the banking and insurance sectors have shifted their resources to be digital-first, all the more so since the start of the global pandemic. For today’s customers, who increasingly begin their banking experiences using digital chan… Continue reading Web Application Firewalls Instrumental in Digital-First Banking

When are Privacy Violations Sufficient to Sue?

In order to get into court – particularly federal court – a party has to demonstrate that they have “standing” to sue — that is, that they have personally suffered some kind of concrete and demonstrable harm as a result of someone el… Continue reading When are Privacy Violations Sufficient to Sue?

Borderline Unreasonable Electronic Device Searches

It has long been the law that searches – of one’s person, places, houses and effects – without probable cause and a warrant are presumptively unreasonable. Moreover, searches of electronic devices, which contain massive amounts of intimate… Continue reading Borderline Unreasonable Electronic Device Searches