CPDP 2021 – Moderator: Nataliia Bielova ‘Standard For Consent: Still A Dream Or A Soon-To-Be Reality?’

Speakers: Armand Heslot, Cristiana Santos, Romain Robert, Aurélie Pols, Benoît Oberlé

Our sincere thanks to CPDP 2021 – Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization’s YouTube channel… Continue reading CPDP 2021 – Moderator: Nataliia Bielova ‘Standard For Consent: Still A Dream Or A Soon-To-Be Reality?’

CPDP 2021 – Moderator: Jennifer Baker ‘Oversight And Enforcement: Taking Stock Of Design Choices And Trade-Offs’

Speakers: Alice Munyua, Willem Debeuckelaere, Shinjini Kumar, Anais Le Gouguec

Our sincere thanks to CPDP 2021 – Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization’s YouTube channel. Enjo… Continue reading CPDP 2021 – Moderator: Jennifer Baker ‘Oversight And Enforcement: Taking Stock Of Design Choices And Trade-Offs’

A Cyber Executive Order For the 21st Century

The long-expected Executive Order On Improving the Nation’s Cybersecurity was published Wednesday, May 12, 2021. My initial reaction is positive. It calls for using multifactor authentication and encryption within Federal agencies after all, things th… Continue reading A Cyber Executive Order For the 21st Century

Follow Up: The Microsoft Exchange Attack | ARIA Cybersecurity

While past blogs focused on the initial cyberattack involving Microsoft Exchange Server, this follow-up article takes a much closer look at what really happened–and how similar attacks can be avoided.
The post Follow Up: The Microsoft Exchange At… Continue reading Follow Up: The Microsoft Exchange Attack | ARIA Cybersecurity

How to Protect Structured and Unstructured Data

Every effective PII protection effort addresses three critical imperatives – data discovery, access governance and risk mitigation. IT teams grappling with privacy mandates need to consider these factors across their unstructured and structured data c… Continue reading How to Protect Structured and Unstructured Data

Federal Court Narrows ‘Third Party’ Warrant Requirement

In United States v. Carpenter, the United States Supreme Court ruled that, before the police could obtain historical cell site location information (CSLI) about the location of someone’s cell phone in the past, they had to seek and obtain a warrant fr… Continue reading Federal Court Narrows ‘Third Party’ Warrant Requirement

How to Ensure Security when Buying a Refurbished or Second-Hand Smartphone

Last year, a Which? investigation found that 31% of resold smartphone models from three of the major used and refurbished handset stores are no longer receiving security updates. Phone manufacturers only schedule data updates for a certain period … Continue reading How to Ensure Security when Buying a Refurbished or Second-Hand Smartphone

CPDP 2021 – Moderator: Tal Zarsky ‘AI Audits: Black Box Vs. White Box Perspectives’

Speakers: Courtney Bowman, Sandra Wachter, Gianclaudio Malgieri, Jane Bambauer

Our sincere thanks to CPDP 2021 – Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization’s YouTube channel. Enjoy… Continue reading CPDP 2021 – Moderator: Tal Zarsky ‘AI Audits: Black Box Vs. White Box Perspectives’

CPDP 2021 – Moderator: Jonas Staal ‘Collectivize Facebook – A Pre-Trial: Transforming Facebook And Other Trillion-Dollar Companies Into New Transnational Cooperatives Under User Control’

Speakers: Jan Fermon, Sonia De Jager, Mette Birkedal Bruun, Annemie Vanackere

Our sincere thanks to CPDP 2021 – Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization’s YouTube channel. Enjoy!… Continue reading CPDP 2021 – Moderator: Jonas Staal ‘Collectivize Facebook – A Pre-Trial: Transforming Facebook And Other Trillion-Dollar Companies Into New Transnational Cooperatives Under User Control’