Privacy | News, how-tos, features, reviews, and videos
A year into his role, Lee discusses how he and Zoom's security team addressed security and privacy issues amid rapid growth and public scrutiny.
Sensitive company and personal data often leaves organizations on disposed devices. An auditable chain of custody that shows data destruction is essential for any ITAD program.
Increasing focus on enforcement of EU cookie regulations highlights importance of compliance for organisations to avoid fines, lawsuits, and impact on cybersecurity.
Implementing the CDR is not so easy, initial testers have found, given the high standards imposed on securing consumers’ personal data and the still-early experience in applying them.
Check out these free, standout software tools that will make your daily security work easier, whether it's pen-testing, OSINT, vulnerability assessment, and more.
Record retention is both a fact of life and a growing headache for organizations burdened by a spiraling number of regulations and legal obligations. Here are worst (and best) practices for securing data and documents.
Founded by security and web luminaries, Inrupt has commercialized the Solid Project technology to manage sensitive data in a more secure, compliant manner...if enough people buy into its vision.
Data privacy, current cyberthreats, and cybersecurity culture and training top the list, but are these the right priorities?
An effective approach to data protection controls embraces ethical standards and anticipates new requirements. Here’s how some CISOs and other experts tackle the issue.
After police used TraceTogether data outside the scope of its privacy policy, a new law restricts its usage.