HackDig : Dig high-quality web security articles for hacker

Online privacy in 2019: a legislative review

For decades, the United States treated data privacy like an aging home, patching individual leaks and drafts only when a new storm hit. The country passed a law protecting healthcare-related information, and not much else. It then passed a law protecting video rental information, and not much else. It continued this way, repeatedly passing sector-specific la
Publish At:2019-12-23 16:50 | Read:353 | Comments:0 | Tags:Privacy ACCESS Act California Consumer Privacy Act comprehen

A decade in cybersecurity fails: the top breaches, threats, and ‘whoopsies’ of the 2010s

This post was co-authored by Wendy Zamora and Chris Boyd. All opinions expressed belong to your mom. Back in the days before climate change stretched frigid winter months directly into the insta-sweat of summer, there was a saying about March: in like a lamb, out like a lion. The same might be said about the last decade in cybersecurity fails. What kic
Publish At:2019-12-19 16:50 | Read:188 | Comments:0 | Tags:Awareness ashley madison ashley madison hack BadRabbit cambr

New Consumer Online Privacy Rights Act (COPRA) would empower American users

Despite the already dizzying number of comprehensive data privacy proposals before the US Senate—nearly 10 have been introduced since mid-2018—yet another bill has entered the conversation: the Consumer Online Privacy Rights Act. This time, the bill, called COPRA for short, is sponsored by a Democratic Senator from Washington whose name has rarely been c
Publish At:2019-12-17 16:50 | Read:348 | Comments:0 | Tags:Privacy Big Tech Consumer Online Privacy Rights Act COPRA da

ACCESS Act might improve data privacy through interoperability

Data privacy is back in Congressional lawmakers’ sights, as a new, legislative proposal focuses not on data collection, storage, and selling, but on the idea that Americans should be able to more easily pack up their user data and take it to a competing service—perhaps one that better respects their data privacy. The new bill would also require certain t
Publish At:2019-11-11 23:20 | Read:373 | Comments:0 | Tags:Privacy ACCESS Act Apple Pages Big Tech Center for Democracy

Growing rate of robocalls threatens user privacy

When a person sees a call from an unknown number and picks up to hear a recorded voice on the other end, they’ve received a robocall. Some are helpful, such as reminders of upcoming doctor’s appointments or school announcements. However, the vast majority are from unsolicited parties trying to convince people to purchase products or services,
Publish At:2019-10-23 16:50 | Read:558 | Comments:0 | Tags:Privacy Data privacy do not call registry FCC FTC high-risk

Will the Future of Authentication Run Into a Privacy Wall?

Identity authentication is absolutely necessary to conducting our affairs today. Without it, we would lose virtually all confidence to conduct business or create and foster relationships. But with ever increasing concerns related to data privacy, it is worth looking at the past to see what future challenges we may face in the digital identity space. From Jew
Publish At:2019-10-18 10:20 | Read:488 | Comments:0 | Tags:Identity & Access Risk Management Artificial Intelligence (A

Insurance data security laws skirt political turmoil

Across the United States, a unique approach to lawmaking has proved radically successful in making data security stronger for one industry—insurance providers. The singular approach has entirely sidestepped the prolonged, political arguments that have become commonplace when trying to pass federal and state data privacy laws today. In California, for
Publish At:2019-09-25 23:20 | Read:812 | Comments:0 | Tags:Privacy Anthem California California Consumer Privacy Act CC

What role does data destruction play in cybersecurity?

When organization leaders think about cybersecurity, it’s usually about which tools and practices they need to add to their stack—email protection, firewalls, network and endpoint security, employee awareness training, AI and machine-learning technology—you get the idea. What’s not often considered is which items should be taken away. Nearly
Publish At:2019-09-20 23:20 | Read:2030 | Comments:0 | Tags:Business data data breach data destruction Data privacy dega

CEOs offer their own view of a US data privacy law

Last week, the chief executives of more than 50 mid- and large-sized companies urged Congress to pass a national data privacy law to regulate how companies collect, use, and share Americans’ data. Buried deep within the chief executives’ recommendations for such a law, presented as a policy framework for guidance, was a convenient proposal: Private indiv
Publish At:2019-09-20 11:20 | Read:443 | Comments:0 | Tags:Privacy Brave Brave browser Business Roundatble California C

Getting a Grip on GDPR: The Secret Is Knowing Where to Begin

An old friend once gave me some really valuable advice about reaching a goal. He said that you can’t get to where you’re going if you don’t know where you are. Over the years, I’ve found that to be true in a lot of situations. But I think it’s especially fitting in discussing GDPR readiness. Know Where You Stand With GDPR Readin
Publish At:2017-11-06 09:40 | Read:4670 | Comments:0 | Tags:Data Protection Compliance Cybersecurity Legislation Data Pr

Investigating IoT Crime in the Age of Connected Devices

People are beginning to get used to the easy life enabled by smart homes and the Internet of Things (IoT), but they are at risk if they do not prioritize security. The IoT has increased quality of life for many; it has helped the differently abled and the elderly to continue living independently and laid the technological groundwork for another industrial re
Publish At:2017-10-27 14:00 | Read:4286 | Comments:0 | Tags:Fraud Protection Mobile Security Security Intelligence & Ana

Financial Institutions Join Forces to Solve the Intensifying Cloud Compliance Dilemma

The intensifying regulation of cloud services has become a major threat to financial institutions’ growth and innovation. An overwhelming number of regional and jurisdictional mandates aimed at ensuring cloud security, data protection and privacy are consuming company resources. Compliance with these evolving and often conflicting regulatory demands ha
Publish At:2017-10-26 19:35 | Read:5023 | Comments:0 | Tags:Banking & Financial Services Cloud Security Cloud Cloud Serv

How We Developed the IBM Security GDPR Framework

Why It’s So Hard to Design Something Simple In our previous blog post, Adam Nelson and I suggested that you set aside time with other people in your organization and familiarize yourselves with General Data Protection Regulation (GDPR) and its requirements. Have you done that yet? Don’t be embarrassed to admit that you haven’t. Because eith
Publish At:2017-10-02 14:15 | Read:6139 | Comments:0 | Tags:Data Protection Compliance Data Privacy General Data Protect

Back to Filing Cabinets? Simplifying the Complex Task of Data Security

Data drives our businesses, economy and daily lives, so it comes as no surprise that data security needs to be a priority. But do we know what data we really have, where sensitive information is being collected and stored, what is happening with the data and where it is ultimately going? How do we build security around critical assets that we need to protect
Publish At:2017-09-29 11:50 | Read:4466 | Comments:0 | Tags:Data Protection Data Classification Data Privacy Data Securi

Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges

Every chief information security officer (CISO) faces ongoing threats to his or her company’s assets. While some threats apply to every industry, IT security specialists in the health care, financial services, and energy and utilities sectors need to pay more attention to industry-specific security risks. Although these threats are most prevalent in th
Publish At:2017-09-26 09:56 | Read:2655 | Comments:0 | Tags:Banking & Financial Services CISO Energy & Utility Health Ca

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud