#data-protection

[ follow ]
Information security
fromMedium
1 month ago

DLP vs. EDR: A Technical Deep Dive Beyond the Acronyms

DLP focuses on identifying, monitoring, and protecting sensitive data flows and storage, while EDR focuses on detecting, investigating, and responding to malicious endpoint behaviors and threats.
Privacy technologies
fromComputerWeekly.com
2 days ago

ICO publishes summary of police facial recognition audit | Computer Weekly

South Wales and Gwent Police use facial recognition with processes and safeguards assessed as largely compliant with UK data protection requirements.
#data-breach
#ai-security
fromHackernoon
2 years ago
Tech industry

The HackerNoon Newsletter: 9 Things Hollywood Gets Wrong About Hacking (8/3/2025) | HackerNoon

fromHackernoon
2 years ago
Tech industry

The HackerNoon Newsletter: 9 Things Hollywood Gets Wrong About Hacking (8/3/2025) | HackerNoon

EU data protection
fromIndependent
5 days ago

Donald Trump warns Irish digital watchdogs to back off US tech giants as he threatens 'substantial tariffs'

Irish data regulators enforcing the EU Digital Services Act could face US visa restrictions and sanctions amid new trade threat measures.
fromMedium
1 month ago

DLP vs. EDR: A Technical Deep Dive Beyond the Acronyms

DLP protects sensitive data and controls its movement; EDR detects, investigates, and responds to endpoint threats, reflecting distinct objectives and operational impacts.
fromPrivacy International
1 week ago

Privacy International issues complaint to the UK regulator regarding the deployment of two algorithms for immigration purposes suspected of failing to adequately comply with data protection law

The complaint highlights significant concerns with these tools including the collection, retention, and processing of data presumptively in violation of many of the legal requirements set out in the UK GDPR and the DPA 2018. From PI's perspective, the HO's use of these tools is opaque, lacks a clear and foreseeable justification, processes unjustifiable volumes of personal data, is subject to inadequate human review, and may be adversely impacting migrants who are subject to them.
EU data protection
fromwww.bbc.com
1 week ago

Dozens more UK Afghan data breaches uncovered

What began as an isolated incident, which the Ministry of Defence initially sought to keep from public view, has now escalated into a series of catastrophic failings. "We urge the Ministry of Defence to be fully transparent with both those affected and the wider public. Victims should not be forced to learn the truth through legal action or news reports."
UK politics
#privacy
fromPrivacy International
1 week ago
Privacy professionals

Privacy International issues complaint to the UK ICO regarding the Home Office's deployment of two algorithms for immigration purposes suspected of failing to adequately comply with data protection law

fromPCWorld
3 weeks ago
Privacy professionals

De-Google your life: These 17 privacy-obsessed apps will set you free

from9to5Mac
4 weeks ago
Privacy professionals

PSA: Make sure you have these privacy features enabled on your iPhone - 9to5Mac

fromPrivacy International
1 week ago
Privacy professionals

Privacy International issues complaint to the UK ICO regarding the Home Office's deployment of two algorithms for immigration purposes suspected of failing to adequately comply with data protection law

fromPCWorld
3 weeks ago
Privacy professionals

De-Google your life: These 17 privacy-obsessed apps will set you free

from9to5Mac
4 weeks ago
Privacy professionals

PSA: Make sure you have these privacy features enabled on your iPhone - 9to5Mac

#gdpr
fromeuronews
1 week ago
EU data protection

Austrian newspaper's consent model violates EU privacy rules: court

Der Standard's 'pay or OK' model violates EU data protection rules by limiting consent options contrary to GDPR requirements.
fromDatabreaches
1 month ago
EU data protection

German court offers EUR 5000 compensation for data breaches caused by Meta

The Leipzig District Court awarded Facebook users EUR 5000 for data protection violations by Meta.
fromPrivacy International
1 week ago

PI rings the alarm bell and alerts ICO about the use of algorithms by the Home Office and their impact on migrants

Home Office's use of automated tools in immigration enforcement raises concerns about privacy and compliance with data protection laws.
fromIT Pro
1 week ago

'Hugely significant': Experts welcome UK government plans to back down in Apple encryption battle - but it's not quite over yet

UK government plans to abandon forcing Apple to share user data.
fromThe Hacker News
2 weeks ago

Wazuh for Regulatory Compliance

Organizations must comply with regulatory standards to safeguard sensitive data. Effective compliance prevents cybersecurity threats, protects business processes, and reduces financial risks.
Privacy professionals
fromEntrepreneur
2 weeks ago

Stay One Step Ahead of Cyber Threats for Five Years for $35 | Entrepreneur

With AdGuard VPN's five-year plan, you're getting enterprise-level privacy at a price that makes financial sense. And it's on sale for just $34.97 (MSRP: $359.40).
Privacy technologies
Privacy professionals
fromTECHBOOK
2 weeks ago

Pay or Share Your Data? The Controversial Subscription Model on Facebook and Instagram

Meta has introduced a subscription option for Facebook and Instagram to avoid ad-related data sharing.
fromZDNET
2 weeks ago

Stop using AI for these 9 work tasks - here's why

AI can cause irreparable harm and sharing sensitive information could have legal ramifications.
#cybersecurity
fromDataBreaches.Net
2 weeks ago

Children's Health Ireland faces investigation over data breach of health records at Tallaght Hospital - DataBreaches.Net

DPC has initiated an inquiry into CHI over concerns regarding the security of children's health records.
EU data protection
fromComputerWeekly.com
2 weeks ago

Protecting your data in the EU means protecting an independent authority | Computer Weekly

The effectiveness of the European data protection framework relies on robust individual rights and independent enforcement authority.
fromHackernoon
1 year ago

The HackerNoon Newsletter: Agentic AI and the Rise of Outcome Engineering (8/10/2025) | HackerNoon

Immutable backups prevent ransomware and ensure data integrity, meeting compliance needs with secure, tamper-proof cloud data protection. They safeguard critical data effectively.
Tech industry
Cryptocurrency
fromHackernoon
1 month ago

The Great Quantum Mirage: Why We're Solving Tomorrow's Problem While Missing Today's Crisis | HackerNoon

The immediate quantum threat involves systematic harvesting of encrypted data, not just the eventual breaking of encryption.
fromThe Verge
3 weeks ago

7 password managers to help keep your apps safe

Using a password manager is essential for managing unique passwords across different services and devices.
fromBusiness Matters
3 weeks ago

The iGaming Industry's Role in Shaping the Future of Online Business Security

iGaming has evolved into a leader in security and regulatory compliance beyond mere entertainment.
fromeLearning Industry
3 weeks ago

Secure Your eLearning Software: 10 Steps To Lock It Down Before Launch

Launching an eLearning platform without securing software can lead to cyberattacks, data leaks, and malware infections, jeopardizing user safety and brand reputation.
Online learning
Privacy professionals
fromHackernoon
1 month ago

Protocol That Leaks Your Every Move: A Guide to DNS Privacy | HackerNoon

DNS compromises online privacy due to its plaintext transmission, allowing ISPs and third parties to intercept user queries easily.
#ransomware
fromIT Pro
3 weeks ago
Privacy professionals

Nearly one-third of ransomware victims are hit multiple times - even after paying up to hackers

fromHackernoon
1 year ago
Tech industry

The TechBeat: Here's The Exact Indie-Hacking Vibe-Coding Setup I Use as a Middle-Aged Product Manager (8/3/2025) | HackerNoon

fromIT Pro
3 weeks ago
Privacy professionals

Nearly one-third of ransomware victims are hit multiple times - even after paying up to hackers

fromHackernoon
1 year ago
Tech industry

The TechBeat: Here's The Exact Indie-Hacking Vibe-Coding Setup I Use as a Middle-Aged Product Manager (8/3/2025) | HackerNoon

fromTheregister
3 weeks ago

Meta used Flo menstruation app data to sell ads, jury finds

Meta found guilty of violating California Invasion of Privacy Act by exploiting Flo app user data for advertising.
fromGothamist
3 weeks ago

Surveillance tech could identify your walk. A NYC lawmaker wants that info protected.

"In 2025, surveillance is everywhere. From how we move through the city to how we use our phones, nearly every action leaves a digital trace," Gutiérrez said in a statement. "Right now, the city can collect and share information about how you walk, type or browse - without treating it as sensitive. That needs to change."
Privacy professionals
Tech industry
fromHackernoon
1 year ago

The TechBeat: The Old Internet Can't Handle Real-Time Apps (8/2/2025) | HackerNoon

Bitcoin-native app development is supported by Mezo's Alpha Builder Program.
fromEntrepreneur
1 month ago

They May Look Mundane, But They Distract Employees, Compromise Security, and Slow Your Internet | Entrepreneur

AdGuard Family Plan enhances online security and browsing experience by removing ads and protecting user data.
Privacy professionals
fromClickUp
1 month ago

Privacy Policy Templates for Websites, Apps, & Online Businesses

Using privacy policy templates ensures compliance with data regulations like GDPR and CCPA while saving time and reducing risk.
fromSocpub
1 month ago

How to Create a Data Backup Strategy for Your Business

One corrupt table or misconfigured bucket can stall an entire supply chain run. Fortunately, a clear-headed backup strategy turns that existential threat into a five-minute inconvenience.
Digital life
Artificial intelligence
fromComputerWeekly.com
1 month ago

Interview: How OpenAI is making ChatGPT public and private sector-ready | Computer Weekly

OpenAI partners with the UK government to deploy AI in justice, education, and security sectors, aiming to inform AI infrastructure policy.
fromwww.npr.org
1 month ago

The USDA wants states to hand over food stamp data by the end of July

USDA demands states to share personal information of SNAP recipients, raising privacy concerns among beneficiaries.
fromThe Hacker News
1 month ago

From Backup to Cyber Resilience: Why IT Leaders Must Rethink Backup in the Age of Ransomware

Ransomware-as-a-Service (RaaS) allows inexperienced threat actors to launch large-scale attacks, exfiltrate sensitive data, and disable recovery infrastructure, pushing businesses to reassess their strategies.
Digital life
fromSecuritymagazine
1 month ago

Security and Development Teams Should Work Together to Protect Data in the AI Era

As companies explore new ways to use AI, the challenge of balancing innovation with data protection is more important than ever. Security teams are tasked with protecting information while developers face pressure to deliver. Misalignment results in exposed data and overlooked policies, leading to a lack of responsibility.
Privacy professionals
fromZDNET
1 month ago

6 ways to protect your passport and other travel docs from cybercriminals - before it's too late

Travel documents, if scanned or stored digitally, are vulnerable to theft and exploitation.
Privacy professionals
fromFortune
1 month ago

Identity theft is on pace to set a new record in 2025

Data compromises in the U.S. reached 1,732 in early 2025, exceeding last year's pace and potentially setting a new record.
fromSitePoint Forums | Web Development & Design Community
1 month ago

Has anyone created a website for a customer without a need for a "Security Incident Response Process" and "24/7 call center"? and NOT get fined doing so

Creating a web application that handles credit card information or personally identifiable information requires implementing stringent security measures to protect user data and comply with regulations.
E-Commerce
#arts-council
EU data protection
fromComputerWeekly.com
1 month ago

European Commission accused of rigging data watchdog appointment | Computer Weekly

European Commission allegedly rigged selection process for data protection watchdog in favor of its own candidate, raising concerns about independence.
fromFlowingData
1 month ago

DOGE goes for farmers' financial and personal data

"USDA has a lot of data that people should be very concerned about protecting for a lot of different reasons," said one current USDA employee who requested anonymity due to ongoing fear of retaliation. "Farmers' financial and production data should be protected at all costs, for privacy reasons and because of competition. If you got access to disaster payments, you would be able to layer a lot of data and arrive at a lot of valuable conclusions about productivity and U.S. farmland, futures markets, and commodity prices. You can hedge a lot of bets and make a lot of money if you know what's happening with U.S. agriculture."
Privacy professionals
fromIT Pro
1 month ago

Post-quantum cryptography is now top of mind for cybersecurity leaders

"People don't believe it will happen until it happens. The first public attack breaking encryption will trigger urgency," said Julio Padilha, CISO of Volkswagen & Audi, South America.
Information security
DevOps
fromComputerWeekly.com
1 month ago

Podcast: Container storage challenges and how to overcome them | Computer Weekly

Containers provide agility and speed but require careful planning for scale, technical needs, and automation.
fromThe Hacker News
1 month ago

5 Ways Identity-based Attacks Are Breaching Retail

Adidas confirmed a data breach caused by an attack on a third-party customer service provider. The company said customer data was exposed, including names, email addresses, and order details.
Privacy professionals
Privacy technologies
fromHackernoon
4 months ago

Implementing Zero Trust Security in Cloud-Native Environments by Shashi Prakash Patel | HackerNoon

Cloud-native architectures require Zero Trust Security to ensure effective data protection and application security.
fromGadgets 360
2 months ago

This Coros Smartwatch Flaw Lets Malicious Users View Data, Notifications

The security flaws were discovered by a German IT firm when the Coros Watch 3 was paired with an Android smartphone, allowing unauthorized access to private data.
Gadgets
fromLos Angeles Times
2 months ago

Court approves sale of 23andMe to nonprofit led by co-founder Anne Wojcicki

"A company's sale of genetic data is a scary proposition, and reasonable people might conclude that it should not be permitted in any circumstances."
Privacy professionals
fromSearch Engine Roundtable
2 months ago

Google AdSense Adds New Privacy Law & Opt-Out Mechanism

Google AdSense has introduced universal opt-out mechanisms and privacy controls to comply with new state laws regarding user data and ad targeting.
fromwww.theguardian.com
2 months ago

Is surveillance by private operators legal in the UK?

Private surveillance operates legally in a grey area without specific regulations, which raises ethical concerns.
Privacy professionals
fromTechCrunch
2 months ago

Germany tells Apple, Google to remove DeepSeek from the country's app stores | TechCrunch

Germany has ordered Apple and Google to remove the Chinese AI app DeepSeek due to illegal data transfer concerns.
fromBusiness Matters
2 months ago

Manchester businessman cleared of hacking charges in ICO case

Craig Cornick was cleared of computer hacking charges after a private prosecution, but found guilty of a lesser charge of unlawfully obtaining personal data.
[ Load more ]