Latest from todaynewsHundreds of UK Ministry of Defence passwords found circulating on the dark webMOD detected 600 stolen credentials in dark web trawl, including 124 compromised this year.By John E. Dunn02 Dec 20244 minsGovernment ITPrivacySecurity news NIST publishes timeline for quantum-resistant cryptography, but enterprises must move fasterBy Evan Schuman13 Nov 20246 minsEncryptionPrivacySecuritynews Tor browser, Tails OS merge to offer users improved security and privacyBy Howard Solomon30 Sep 20244 minsBrowser SecurityInternet SecurityPrivacy analysisThe 18 biggest data breaches of the 21st centuryBy Michael Hill, Dan Swinhoe and John Leyden 12 Sep 202418 minsData BreachMalwarePhishing news AT&T confirms arrest in data breach of more than 110 million customersBy Evan Schuman 12 Jul 20246 minsCyberattacksData BreachPrivacy newsMobile surveillance software firm mSpy suffers data breachBy John Leyden 12 Jul 20244 minsData BreachPrivacy featureWhat is Tor Browser? Software for protecting your identity onlineBy J.M. Porup 14 Jun 202412 minsInternetPrivacySecurity news analysisWindows Recall — a ‘privacy nightmare’?By Matthew Finnegan 24 May 20241 minPrivacy featureGeneral Data Protection Regulation (GDPR): What you need to know to stay compliantBy Michael Nadeau 04 Apr 202421 minsComplianceData and Information SecurityPrivacy ArticlesopinionIs privacy being traded away in the name of innovation and security?The rush to embrace generative AI highlights how privacy can suffer when it’s not a key consideration of security policies and implementations.By Christopher Burgess 12 Feb 2024 6 minsGenerative AIPrivacySecurity PracticesnewsFacebook tops security ratings among social networksEnterprise-grade authentication remains an Achilles heel of the social media world, but security is improving in other areas, according to a report by access management provider Cerby.By Jon Gold 07 Nov 2023 3 minsIdentity and Access ManagementInternet SecurityPrivacynewsOnline Safety Bill passes final parliament debate, set to become UK lawDespite widespread criticism and scrutiny, the UK government is within touching distance of delivering its controversial new internet safety rules.By Michael Hill 20 Sep 2023 3 minsComplianceEncryptionPrivacybrandpostSponsored by IncogniAI and privacy: safeguarding your personal information in an age of intelligent systemsArtificial intelligence thrives on vast quantities of data. But it also raises real privacy issues, especially where it harvests information from the internet.By CSO Contributor 13 Jul 2023 4 minsInternet SecurityPrivacybrandpostSponsored by IncogniWhy data removal services are vital to maintain privacy amid rising cyber crimeSecurity professionals must consider using data removal services as identity fraud grows. By CSO Contributor 13 Jul 2023 4 minsCybercrimePrivacynewsSecurity, privacy experts slam UK Online Safety Bill in open letterThe letter states that compromise of proposed monitoring infrastructure could create national security threats.By Michael Hill 05 Jul 2023 5 minsCommunications SecurityEncryptionPrivacynewsWhatsApp, Signal, Viber sign Open Letter opposing UK Online Safety BillOpen letter urges UK government to address the risks the Online Safety Bill poses to data security, protection, and privacy.By Michael Hill 18 Apr 2023 3 minsEncryptionPrivacyRegulationnewsTribunal rules MI5 acted unlawfully when retaining intercepted personal dataA panel of three judges has ruled that “widespread corporate failure” led to the UK spy agency and the Home Office not taking its legislative obligations for data retention seriously.By Charlotte Trueman 31 Jan 2023 4 minsGovernmentLegalPrivacynewsUK publishes new security, privacy rules for app store operators, developersNew code of practice requires app store operators and developers to implement clear vulnerability disclosure processes.By Michael Hill 12 Dec 2022 3 minsApplication SecurityCompliancePrivacynewsUK ICO reprimands 7 organisations for failing to adhere to UK GDPR Subject Access Request lawsThe Ministry of Defence, Home Office and Virgin Media among the organisations which have failed to respond to Subject Access Request in time, if at all.By Michael Hill 29 Sep 2022 2 minsComplianceGDPRPrivacyopinionHiQ v LinkedIn court ruling will have a material effect on privacyA U.S. appeals court has ruled that hiQ's scraping of public LinkedIn data is not a violation of the U.S. Computer Fraud and Abuse Act.By Christopher Burgess 01 Jun 2022 5 minsCSO and CISOData PrivacyPrivacynewsUK privacy watchdog fines Clearview AI £7.5 million for breaking data protection lawsThe UK Information Commissioner’s Office has fined facial recognition firm Clearview AI £7,552,800 over its use of images of people’s faces and data from publicly available information.By Michael Hill 24 May 2022 3 minsComplianceData PrivacyPrivacy Show more Show less View all Resources whitepaper Unlock Data Value: A Proven Framework To Implement Data Products This webinar explains critical data product concepts and guides your organization to effectively implement a data-products strategy and data-streaming platform that unifies your operational and analytical data for any use case. The post Unlock Data Value: A Proven Framework To Implement Data Products appeared first on Whitepaper Repository –. By CONFLUENT 24 Feb 2025Business OperationsData ArchitectureDigital Transformation whitepaper How to assess potential business value in 5 minutes – Human Capital Management By Workday Inc. 22 Nov 2024Business OperationsCloud ComputingIT Management whitepaper How to assess potential business value in 5 minutes – Finance and Human Resources By Workday Inc. 22 Nov 2024Business OperationsCloud ComputingIT Leadership View all Video on demand videoAligning security, compliance and privacy across inventory trackingBrad Wells, Executive Director, Information Security, and Kandice Samuelson, Senior Director, IT Governance at PPD lead a team enhancing PPD’s inventory tracking system that identifies PPD’s most valuable assets. Join us to learn how they distribute security resources for appropriate levels of protection, maintain compliance with government regulations and industry standards, and leverage information security controls aligned with client requirements, industry frameworks and privacy regulations. 28 May 2021 20 minsComplianceData and Information SecurityPrivacy How the California Consumer Privacy Act (CCPA) will affect you and your business | TECH(talk) 06 Sep 2019 23 minsData PrivacyGDPRGovernment 6 security reasons to upgrade to Windows 10 25 Jul 2018 1 minsApplication SecurityPrivacyWindows Prepping for GDPR 18 May 2018 36 minsPrivacyRegulationSecuritySee all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Risk Management View all topics Show me morePopularArticlesPodcastsVideos news Linux, macOS users infected with malware posing as legitimate Go packages By Shweta Sharma 07 Mar 20253 mins MalwareSecurity feature 8 obstacles women still face when seeking a leadership role in IT By Christina Wood 07 Mar 20258 mins CareersIT Leadership feature What is risk management? Quantifying and mitigating uncertainty By Josh Fruhlinger 07 Mar 202510 mins IT Governance FrameworksIT LeadershipRisk Management podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain