As GDPR looms, 60% of global enterprises still don’t properly tag sensitive data

The EU’s General Data Protection Regulation (GDPR) goes into effect on May 25, but many companies are still not in compliance with its rules, according to a new report from AvePoint and the Centre for Information Policy Leadership (CIPL). In a survey of 235 multinational organizations, 60% said they do not have any procedures in place to identify and […]

How Facebook’s data issue is a lesson for everyone

The headlines have been dominated by the recent news around Facebook, Cambridge Analytica and the misuse of customer data. The impact of these revelations has led to millions being wiped off Facebook’s share price and an ongoing investigation into the incident. With just two months left until the General Data Protection Regulation (GDPR) comes into effect, this scandal […]

Are you letting GDPR’s privacy rules trump security?

When incident detection vendor SecBI found suspicious activity on company devices at one of its clients, they passed on the data with the expectation that the client, a large European enterprise, would investigate further. That didn’t happen. The client’s security team was not allowed to look at the data due to privacy concerns. A contract […]

GDPR is more important than ever: The Cambridge Analytica-Facebook meltdown

The Cambridge Analytica-Facebook fiasco started when Dr. Aleksandr Kogan developed a quiz app called “thisisyourdigitallife” and managed to obtain user data through that app by scraping data from the profiles of people who took the quiz as well as that of their friends—apparently allowed under Facebook’s policy for third-party apps at the time!! This is […]

A Data Protection Officer’s Guide to the GDPR Galaxy

In April 2016, the General Data Protection Regulation (GDPR) was passed into law in the European Union. The goal of the law is to give individuals control over their own data. While GDPR became law in 2016, it won’t become enforceable until May 25, 2018. GDPR is composed of 99 articles and 173 recitals that are used […]

9 reasons to be cautious with blockchain

Is blockchain — the network of global online ledgers — really secure? Its proponents say yes, as it assigns transactions or smart contracts to an immutable ledger, verifiable by multiple parties. However, a recently published paper calls out some vulnerabilities that may subject blockchain entries to inefficiencies, hacking and other criminal activity. The paper, published by Xiaoqi […]

Not a breach, Facebook says after suspending firm that took 50M Facebook users’ data

Facebook has announced that it is suspending Strategic Communication Laboratories (SCL) and its political data analytics firm Cambridge Analytica – the data analytics firm that worked with Trump’s election. The move came a few hours before The Guardian and The New York Times reported on Saturday that SCL and Cambridge had surreptitiously harvested data from about 50 million Facebook accounts. The […]

14 privacy tools you should use to stay secure

From encrypted instant messengers to secure browsers and operating systems, these privacy-enhancing apps, extensions, and services can protect you both online and offline. Read about the fourteen privacy tools which you should adapt to stay secure online as well as offline on ZDNet.

Organizations are not doing enough to protect data privacy

In today’s data-driven society, privacy, security and trust are more vital and intertwined than ever before. But many organisations are not doing all they can to protect data privacy, according to PwC’s 2018 Global State of Information Security Survey (GSISS). The survey draws on responses of 9,500 senior business and technology executives from 122 countries. […]

Global security trends for 2018: GDPR, identity and access security

In its third annual global IT security survey, Versasec found Europe’s General Data Protection Regulation (GDPR) is impacting security planning around the world, smart card deployment is on the rise, and that many companies continue to rely on the inadequate protection offered by user names and passwords alone. These results and more came from IT […]