SMEs awareness of GDPR is high, but few adhere to its legal requirements
85 percent of the small- to medium-sized enterprises (SMEs) in the UK are familiar with GDPR, but more than half are still not cleaning their data and therefore not adhering …
How to prepare for Apple’s Mail Privacy Protection
Over the last few years, consumers began to be more concerned and have greater understanding of the importance of privacy. In a recent survey conducted by Statista, over half …
Firefox 91 delivers new security and privacy options
Released on August 10, Firefox 91 delivers HTTPS by Default in Private Browsing mode and an enhanced cookie clearing option. Increased security with HTTPS by Default HTTP over …
The value of PII and how it still fuels malign activities in the digital ecosystem
The COVID-19 pandemic engendered new vulnerabilities in the digital ecosystem for threat actors to exploit, resulting in items like vaccines, fraudulent vaccine certificates, …
Most organizations are at an elevated risk of attack
The risk of cyberattacks has increased in the last year. According to a Trend Micro survey, 80% of global organizations report they are likely to experience a data breach that …
Most marketers support federal consumer privacy protections
Kubient conducted a survey of marketing and advertising professionals to provide a snapshot of industry perspectives on increasing privacy regulations, including the …
Lack of email validation and opt-in processes hinder organizations from achieving compliance
Pathwire released the results of its Data Compliance Survey, a survey of 1,000 IT and marketing decision-makers across the globe on the most common data privacy and compliance …
Verifiable credentials are key to the future of online privacy
To realize the full potential of online services, identity verification solutions are required to avoid fraud and boost trust in the systems, for both end users and …
User data privacy decisions can be easily manipulated
Data privacy is an important topic in the digitalized economy. Recent policy changes have aimed to strengthen users’ control over their own data. Yet new research from …
Image encryption technique could keep photos safe on popular cloud photo services
The past decade has witnessed scandal after scandal over private images maliciously or accidentally made public. A study from computer scientists at Columbia Engineering …
Is differential privacy the ideal privacy-enhancing computation technique for your business?
As security & risk management (SRM) leaders globally adjust to a “new normal” brought about by the COVID-19 pandemic, businesses must adapt their privacy programs for …
How to strike the balance between privacy and personalization in healthcare and beyond
The trade-off between widespread technology adoption and responsible use often lies on the spectrum of privacy. When it comes to technologies fueled by data, such as …
Featured news
Resources
Don't miss
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics
- How to use Hide My Email to protect your inbox from spam
- Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891)
- DeepSeek’s popularity exploited by malware peddlers, scammers