Latest from todaynewsHundreds of UK Ministry of Defence passwords found circulating on the dark webMOD detected 600 stolen credentials in dark web trawl, including 124 compromised this year.By John E. Dunn02 Dec 20244 minsGovernment ITPrivacySecurity news NIST publishes timeline for quantum-resistant cryptography, but enterprises must move fasterBy Evan Schuman13 Nov 20246 minsEncryptionPrivacySecuritynews Tor browser, Tails OS merge to offer users improved security and privacyBy Howard Solomon30 Sep 20244 minsBrowser SecurityInternet SecurityPrivacy analysisThe 18 biggest data breaches of the 21st centuryBy Michael Hill, Dan Swinhoe and John Leyden 12 Sep 202418 minsData BreachMalwarePhishing news AT&T confirms arrest in data breach of more than 110 million customersBy Evan Schuman 12 Jul 20246 minsCyberattacksData BreachPrivacy newsMobile surveillance software firm mSpy suffers data breachBy John Leyden 12 Jul 20244 minsData BreachPrivacy featureWhat is Tor Browser? Software for protecting your identity onlineBy J.M. Porup 14 Jun 202412 minsInternetPrivacySecurity news analysisWindows Recall — a ‘privacy nightmare’?By Matthew Finnegan 24 May 20241 minPrivacy featureGeneral Data Protection Regulation (GDPR): What you need to know to stay compliantBy Michael Nadeau 04 Apr 202421 minsComplianceData and Information SecurityPrivacy ArticlesopinionIs privacy being traded away in the name of innovation and security?The rush to embrace generative AI highlights how privacy can suffer when it’s not a key consideration of security policies and implementations.By Christopher Burgess 12 Feb 2024 6 minsGenerative AIPrivacySecurity PracticesnewsFacebook tops security ratings among social networksEnterprise-grade authentication remains an Achilles heel of the social media world, but security is improving in other areas, according to a report by access management provider Cerby.By Jon Gold 07 Nov 2023 3 minsIdentity and Access ManagementInternet SecurityPrivacynewsOnline Safety Bill passes final parliament debate, set to become UK lawDespite widespread criticism and scrutiny, the UK government is within touching distance of delivering its controversial new internet safety rules.By Michael Hill 20 Sep 2023 3 minsComplianceEncryptionPrivacyopinionHiQ v LinkedIn court ruling will have a material effect on privacyA U.S. appeals court has ruled that hiQ's scraping of public LinkedIn data is not a violation of the U.S. Computer Fraud and Abuse Act.By Christopher Burgess 01 Jun 2022 5 minsCSO and CISOData PrivacyPrivacyfeatureHow GDPR has inspired a global arms race on privacy regulationsCompanies with a global presence face the challenge of achieving compliance with an increasing array of regional data-protection regulations.By Rosalyn Page 07 Apr 2022 8 minsData PrivacyPrivacyRegulationnews analysisWhat will the Australian privacy law review deliver?A looming federal election brings uncertainty over the Australian privacy law review and questions about whether new regulations will align with Europe’s GDPR.By Rosalyn Page 03 Apr 2022 8 minsData PrivacyPrivacyRegulationfeatureThe state of privacy regulations across AsiaWhile GDPR looms large across the Asia-Pacific region, there are significant differences as jurisdictions develop their own national approaches to privacy. There’s also a growing focus on data security in many countries.By Rosalyn Page 03 Apr 2022 9 minsData PrivacyPrivacyRegulationnews analysisAustralian CISOs continue to struggle on privacyNew ISACA research shows that Australian organisations—including regulators—can’t find sufficient staff to treat privacy by design as seriously and thoroughly as needed.By David Braue 30 Mar 2022 6 minsPrivacynews analysis4 alternatives to encryption backdoors, but no silver bulletAlternatives to backdoors in end-to-end encryption exist, but not all address privacy and security concerns, say experts at last week’s Enigma conference.By Cynthia Brumfield 08 Feb 2022 7 minsEncryptionPrivacyfeatureTop 8 cybersecurity predictions for 2022Seeing opportunities in the mass move to remote work, cyberattackers are updating their tactics, compelling security leaders to respond. Experts make their predictions about threat reduction, compliance, supply chain management, security spending and more.By Shweta Sharma 06 Jan 2022 6 minsComplianceMalwareThreat and Vulnerability ManagementfeatureCyber insurance explained and why you need itCyber insurance can't protect your organization from cybercrime, but it can keep your business on stable financial footing should a significant security event occur.By Michael Hill 01 Dec 2021 9 minsCybercrimeData BreachPrivacyfeatureMicrosoft announces new security, privacy features at IgniteMicrosoft has consolidated some security tools under the Defender brand and added security and privacy features and products. Here's a look at what's new.By Susan Bradley 01 Dec 2021 4 minsMicrosoft AzurePrivacyWindows Security Show more Show less View all Resources whitepaper Unlock Data Value: A Proven Framework To Implement Data Products This webinar explains critical data product concepts and guides your organization to effectively implement a data-products strategy and data-streaming platform that unifies your operational and analytical data for any use case. The post Unlock Data Value: A Proven Framework To Implement Data Products appeared first on Whitepaper Repository –. By CONFLUENT 24 Feb 2025Business OperationsData ArchitectureDigital Transformation whitepaper How to assess potential business value in 5 minutes – Human Capital Management By Workday Inc. 22 Nov 2024Business OperationsCloud ComputingIT Management whitepaper How to assess potential business value in 5 minutes – Finance and Human Resources By Workday Inc. 22 Nov 2024Business OperationsCloud ComputingIT Leadership View all Video on demand videoAligning security, compliance and privacy across inventory trackingBrad Wells, Executive Director, Information Security, and Kandice Samuelson, Senior Director, IT Governance at PPD lead a team enhancing PPD’s inventory tracking system that identifies PPD’s most valuable assets. Join us to learn how they distribute security resources for appropriate levels of protection, maintain compliance with government regulations and industry standards, and leverage information security controls aligned with client requirements, industry frameworks and privacy regulations. 28 May 2021 20 minsComplianceData and Information SecurityPrivacy How the California Consumer Privacy Act (CCPA) will affect you and your business | TECH(talk) 06 Sep 2019 23 minsData PrivacyGDPRGovernment 6 security reasons to upgrade to Windows 10 25 Jul 2018 1 minsApplication SecurityPrivacyWindows Prepping for GDPR 18 May 2018 36 minsPrivacyRegulationSecuritySee all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Risk Management View all topics Show me morePopularArticlesPodcastsVideos news Linux, macOS users infected with malware posing as legitimate Go packages By Shweta Sharma 07 Mar 20253 mins MalwareSecurity feature 8 obstacles women still face when seeking a leadership role in IT By Christina Wood 07 Mar 20258 mins CareersIT Leadership feature What is risk management? Quantifying and mitigating uncertainty By Josh Fruhlinger 07 Mar 202510 mins IT Governance FrameworksIT LeadershipRisk Management podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain