European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China
Austrian privacy group Noyb has filed complaints against companies for unlawfully transferring user data to China, violating EU data protection regulations.
Online Behavioral Ads Fuel the Surveillance Industry-Here's How
Real-time bidding (RTB) is a prevalent but largely unregulated process exposing personal data to numerous advertisers, risking privacy and security.
Ireland fines Meta $263 million for 2018 View As data breach
Meta faces costly legal consequences, including a $31.7 million settlement in Australia and a €251 million fine from the IDPC for data breaches.
The Breachies 2024: The Worst, Weirdest, Most Impactful Data Breaches of the Year
Data breaches are rampant, and often result from companies failing to minimize the data they collect, leading to increased harm to victims.
Here's how Apple protects your privacy with its new AI features
Apple emphasizes user privacy in AI, promising not to use personal data for model training, crucial for maintaining user trust.
Controversial EU ad campaign on X broke bloc's own privacy rules | TechCrunch
The EU's Commission breached its own data protection rules through a microtargeted ad campaign, sparking criticism and legal scrutiny.
European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China
Austrian privacy group Noyb has filed complaints against companies for unlawfully transferring user data to China, violating EU data protection regulations.
Online Behavioral Ads Fuel the Surveillance Industry-Here's How
Real-time bidding (RTB) is a prevalent but largely unregulated process exposing personal data to numerous advertisers, risking privacy and security.
Ireland fines Meta $263 million for 2018 View As data breach
Meta faces costly legal consequences, including a $31.7 million settlement in Australia and a €251 million fine from the IDPC for data breaches.
The Breachies 2024: The Worst, Weirdest, Most Impactful Data Breaches of the Year
Data breaches are rampant, and often result from companies failing to minimize the data they collect, leading to increased harm to victims.
Here's how Apple protects your privacy with its new AI features
Apple emphasizes user privacy in AI, promising not to use personal data for model training, crucial for maintaining user trust.
Controversial EU ad campaign on X broke bloc's own privacy rules | TechCrunch
The EU's Commission breached its own data protection rules through a microtargeted ad campaign, sparking criticism and legal scrutiny.
Safeguarding sensitive data: Essential practices for businesses
Organizations must carefully review and encrypt sensitive data before sharing to mitigate cybersecurity risks and safeguard trust.
The true cost of a security breach
Cybersecurity breaches can lead to immediate financial loss and long-term detrimental effects on company reputation and financial health.
Navigating the Cyber Threat Landscape: Lessons Learned & What's Ahead
2024's cybersecurity landscape was challenged by severe breaches and heightened regulatory demands, necessitating a reevaluation of organizational data protection strategies.
The evolving digital landscape demands proactive security strategies and compliance amidst increasing threats and regulatory changes.
Healthcare data breaches are out of control - here's how the US plans to beef up security standards
The HHS has proposed significant updates to HIPAA's security rule to enhance the protection of healthcare information.
How to detect this infamous NSO spyware on your phone for just $1
Smartphone threats like Pegasus spyware are resurging, prompting the need for enhanced user-level security measures.
Safeguarding sensitive data: Essential practices for businesses
Organizations must carefully review and encrypt sensitive data before sharing to mitigate cybersecurity risks and safeguard trust.
The true cost of a security breach
Cybersecurity breaches can lead to immediate financial loss and long-term detrimental effects on company reputation and financial health.
Navigating the Cyber Threat Landscape: Lessons Learned & What's Ahead
2024's cybersecurity landscape was challenged by severe breaches and heightened regulatory demands, necessitating a reevaluation of organizational data protection strategies.
Arctera Backup Exec 24 review: Ticks all the right backup boxes
Backup Exec's separation from NetBackup allows for dedicated product development, enhancing its potential for SMB data protection solutions.
India Proposes Digital Data Rules with Tough Penalties and Cybersecurity Requirements
The Indian government has introduced the DPDP Rules to enhance personal data protection and empower citizens with control over their personal information.
Many researchers are pseudonymous. That doesn't justify ignoring their alerts.
Roomster lacks a clear and effective channel for reporting security vulnerabilities, violating FTC guidance.
UK rollout of eVisas could leave non-EU migrants vulnerable'
The government is advancing a digital visa scheme without completing necessary checks, raising concerns for vulnerable populations.
Concerns persist over the lack of completed assessments and the vulnerability of the target demographic.
SaaS adoption offers benefits but carries significant security risks and compliance challenges that businesses must address.
Four years on, how's UK GDPR holding up?
UK GDPR has led to significant improvements in data governance among businesses, but challenges remain for SMEs regarding compliance complexity and costs.
Is It Time to Limit SaaS and Return to On-Prem?
SaaS adoption offers significant benefits but poses security and compliance risks that companies must address responsibly.
Is It Time to Limit SaaS and Return to On-Prem?
SaaS adoption offers benefits but carries significant security risks and compliance challenges that businesses must address.
Four years on, how's UK GDPR holding up?
UK GDPR has led to significant improvements in data governance among businesses, but challenges remain for SMEs regarding compliance complexity and costs.
Is It Time to Limit SaaS and Return to On-Prem?
SaaS adoption offers significant benefits but poses security and compliance risks that companies must address responsibly.
The Increasing Threat of Cyber Espionage and Its Impact on Trade Secret Protection
Cyber espionage significantly threatens businesses by compromising trade secrets, leading to financial losses and loss of trust.
Apple to pay $95 million to settle lawsuit accusing Siri of snoopy eavesdropping
Apple will pay $95 million to settle allegations of eavesdropping via Siri, contradicting its privacy commitments.
Authoritarian and heavy-handed': call for investigation into vetting of experts by UK civil servants
Government vetting of speakers for criticism is unlawful and threatens free speech, as shown by the investigation called for by experts.
Healthcare organizations in the US may soon get a cybersecurity overhaul
Healthcare cybersecurity will be bolstered by new HHS proposals requiring multifactor authentication, encryption, and routine vulnerability assessments.
Keepit Secures 48M Investment to Expand Global Reach in SaaS Data Protection
Keepit raised €48 million to enhance its SaaS data protection services and expand globally, focusing on innovation and partnerships.
Lloyds Ad Banned for Greenwashing; Netflix Fined for Use of Customer Data; Temu Named UK's Most Downloaded iPhone App
Lloyds Bank's misleading green claims resulted in an ad ban, shedding light on corporate environmental transparency.
Netflix fined €4.75m for lack of transparency in customer data usage compliance.
Regulating automated decision-making in the Data (Use and Access) Bill | Computer Weekly
Automated decision-making is increasingly prevalent and raises concerns over oversight and individual rights in significant decisions affecting people's lives.
Arcserve UDP 10 review: Top disaster recovery credentials
Arcserve UDP 10 enhances backup and recovery with versatile deployment options, malware scanning, and improved management for physical and virtual environments.
Axon still in possession of Police Scotland encryption keys | Computer Weekly
Axon's possession of encryption keys raises serious data protection concerns for Police Scotland's Digital Evidence Sharing Capability.
Mist v2 Fails to Defend Against Robust Mimicry Methods Like Noisy Upscaling | HackerNoon
Mist v2 fails to enhance digital security against advanced mimicry techniques.