newsTor browser, Tails OS merge to offer users improved security and privacyPlatforms hope by combining, their reach can be expanded, and that the merger ‘will strengthen both organizations' ability to protect people worldwide from surveillance and censorship’.By Howard Solomon30 Sep 20244 minsBrowser SecurityInternet SecurityPrivacy analysis The 18 biggest data breaches of the 21st centuryBy Michael Hill, Dan Swinhoe and John Leyden12 Sep 202418 minsData BreachPhishingRSA Conferencenews AT&T confirms arrest in data breach of more than 110 million customersBy Evan Schuman12 Jul 20246 minsData BreachCyberattacksPrivacy newsMobile surveillance software firm mSpy suffers data breachBy John Leyden 12 Jul 20244 minsData BreachPrivacy featureWhat is Tor Browser? Software for protecting your identity onlineBy J.M. Porup 14 Jun 202412 minsInternetPrivacySecurity news analysisWindows Recall — a ‘privacy nightmare’?By Matthew Finnegan 24 May 20241 minPrivacy featureGeneral Data Protection Regulation (GDPR): What you need to know to stay compliantBy Michael Nadeau 04 Apr 202421 minsComplianceData and Information SecurityPrivacy opinionIs privacy being traded away in the name of innovation and security?By Christopher Burgess 12 Feb 20246 minsGenerative AIPrivacySecurity Practices newsFacebook tops security ratings among social networksBy Jon Gold 07 Nov 20233 minsInternet SecurityIdentity and Access ManagementPrivacy ArticlesnewsOnline Safety Bill passes final parliament debate, set to become UK lawDespite widespread criticism and scrutiny, the UK government is within touching distance of delivering its controversial new internet safety rules.By Michael Hill 20 Sep 2023 3 minsEncryptionCompliancePrivacynews analysisFTC files lawsuit against Kochava for harvesting and selling geolocation dataThe lawsuit claims the data broker is putting people at risk of "stigma, stalking, discrimination, job loss, and even physical violence” through the sale of geolocation data. By Christopher Burgess 30 Aug 2022 5 minsPrivacynews analysisFTC begins sweeping commercial surveillance and lax data security rulemaking processWhile some praise the FTC's efforts, some in Congress worry that it overlaps with and possibly jeopardizes the passing of the American Data Privacy and Protection Act.By Cynthia Brumfield 11 Aug 2022 8 minsData PrivacyPrivacyopinionHiQ v LinkedIn court ruling will have a material effect on privacyA U.S. appeals court has ruled that hiQ's scraping of public LinkedIn data is not a violation of the U.S. Computer Fraud and Abuse Act.By Christopher Burgess 01 Jun 2022 5 minsCSO and CISOData PrivacyPrivacynews analysisData protection concerns spike as states get ready to outlaw abortionThe use of personal data from brokers, apps, smartphones, and browsers to identify those seeking an abortion raises new data protection and privacy risks.By Cynthia Brumfield 23 May 2022 9 minsData PrivacyPrivacyfeatureHow GDPR has inspired a global arms race on privacy regulationsCompanies with a global presence face the challenge of achieving compliance with an increasing array of regional data-protection regulations.By Rosalyn Page 07 Apr 2022 8 minsRegulationData PrivacyPrivacynews analysisWhat will the Australian privacy law review deliver?A looming federal election brings uncertainty over the Australian privacy law review and questions about whether new regulations will align with Europe’s GDPR.By Rosalyn Page 03 Apr 2022 8 minsRegulationData PrivacyPrivacyfeatureThe state of privacy regulations across AsiaWhile GDPR looms large across the Asia-Pacific region, there are significant differences as jurisdictions develop their own national approaches to privacy. There’s also a growing focus on data security in many countries.By Rosalyn Page 03 Apr 2022 9 minsRegulationData PrivacyPrivacynews analysisAustralian CISOs continue to struggle on privacyNew ISACA research shows that Australian organisations—including regulators—can’t find sufficient staff to treat privacy by design as seriously and thoroughly as needed.By David Braue 30 Mar 2022 6 minsPrivacynews analysis4 alternatives to encryption backdoors, but no silver bulletAlternatives to backdoors in end-to-end encryption exist, but not all address privacy and security concerns, say experts at last week’s Enigma conference.By Cynthia Brumfield 08 Feb 2022 7 minsEncryptionPrivacyfeatureTop 8 cybersecurity predictions for 2022Seeing opportunities in the mass move to remote work, cyberattackers are updating their tactics, compelling security leaders to respond. Experts make their predictions about threat reduction, compliance, supply chain management, security spending and more.By Shweta Sharma 06 Jan 2022 6 minsMalwareThreat and Vulnerability ManagementCompliancefeatureCyber insurance explained and why you need itCyber insurance can't protect your organization from cybercrime, but it can keep your business on stable financial footing should a significant security event occur.By Michael Hill 01 Dec 2021 9 minsData BreachCybercrimePrivacy Show more Show less View all Resources whitepaper 2024 Playbook: Identity Security and Cloud Compliance This whitepaper covers identity security and the challenges and benefits of cloud compliance to reduce security risk. The post 2024 Playbook: Identity Security and Cloud Compliance appeared first on Whitepaper Repository –. By CYBERARK 08 Nov 2024Cloud ManagementCyberattacksIT Operations whitepaper Global Cyber Resilience Report 2024 By Cohesity Inc. 08 Nov 2024Business OperationsData and Information SecurityRansomware whitepaper Securing Privileged Access in Transformative Times By CYBERARK 08 Nov 2024CyberattacksIT OperationsSecurity View all Video on demand videoAligning security, compliance and privacy across inventory trackingBrad Wells, Executive Director, Information Security, and Kandice Samuelson, Senior Director, IT Governance at PPD lead a team enhancing PPD’s inventory tracking system that identifies PPD’s most valuable assets. Join us to learn how they distribute security resources for appropriate levels of protection, maintain compliance with government regulations and industry standards, and leverage information security controls aligned with client requirements, industry frameworks and privacy regulations. 28 May 2021 20 minsComplianceData and Information SecurityPrivacy How the California Consumer Privacy Act (CCPA) will affect you and your business | TECH(talk) 06 Sep 2019 23 minsData PrivacyGDPRGovernment 6 security reasons to upgrade to Windows 10 25 Jul 2018 1 minsApplication SecurityPrivacyWindows Prepping for GDPR 18 May 2018 36 minsRegulationPrivacySecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Androxgh0st botnet integrates Mozi payloads to target IoT devices By Lucian Constantin 08 Nov 20245 mins BotnetsThreat and Vulnerability ManagementVulnerabilities news US consumer protection agency bans employee mobile calls amid Chinese hack fears By Gyana Swain 08 Nov 20244 mins Hacking opinion Choosing AI: the 7 categories cybersecurity decision-makers need to understand By Christopher Whyte 08 Nov 202410 mins CSO and CISOSecurity PracticesSecurity Software podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 1) 04 Nov 202419 mins Supply ChainCritical InfrastructureSecurity video CSO Executive Sessions: Standard Chartered’s Alvaro Garrido on cybersecurity in the financial services industry 23 Oct 202410 mins Financial Services IndustrySecurity video CSO Executive Sessions: New World Development’s Dicky Wong on securing critical infrastructure 16 Oct 202412 mins Critical InfrastructureSecurity