
Handle personal data: What we forget is as important as what we remember
This spring, Facebook addressed the issue of permanence across its messaging platforms – from Instagram to Messenger to WhatsApp – with the aim to “set a new standard” for …

How to diminish the great threat of legacy apps
The Equifax breach underscored the risk posed by unpatched software applications. As a refresher, 146 million customer records were exposed after a known vulnerability in …

Most global workers noticed stricter policies at work as a result of GDPR
When enforcement of the GDPR went into effect on May 25, 2018, it had worldwide implications on data protection and privacy legislation. One year later, there are conflicting …

Volume and quality of training data are the largest barriers to applying machine learning
IDC predicts worldwide spending on artificial intelligence (AI) systems will reach $35.8 billion in 2019, and 84% of enterprises believe investing in AI will lead to greater …

How many adults trust companies with their personal data?
More than one third (36%) of adults aged 16–75 trust companies and organizations with their personal data more since GDPR came into effect one year ago, according to TrustArc. …

Week in review: BlueKeep vulnerability, preventing Google account takeovers
Here’s an overview of some of last week’s most interesting news and articles: Data privacy: A hot-button issue for Americans one year after GDPR In recognition of …

US charges Assange with 17 counts under Espionage Act
The US Department of Justice has hit WikiLeaks founder Julian Assange with 17 charges related to illegally obtaining, receiving and disclosing classified information related …

How mainstream media coverage affects vulnerability management
For better or for worse, mainstream media is increasingly covering particularly dangerous, widespread or otherwise notable security vulnerabilities. The growing coverage has …

New infosec products of the week: May 24, 2019
Infocyte HUNT Cloud for AWS: Detection and IR for high-growth cloud environments Infocyte announced the availability of Infocyte HUNT Cloud for AWS, a solution combining …

Solving the network visibility problem with NaaS
Network visibility is crucial for many things: making sure that the equipment works properly monitoring and tweaking the network’s performance and protecting it against …

Enterprises: Analyze your IoT footprint to address security, privacy concerns
The Zscaler ThreatLabZ research team analyzed 56 million IoT device transactions to understand the types of devices in use, the protocols used, the locations of the servers …

A closer look at mobile permissions one year into GDPR
With GDPR reaching its one year anniversary May 25, Airship revealed top-level results of its global benchmark study, examining the state of mobile app user permissions across …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)