privacy

GDPR - Other Governments Will Follow The EU’s Example

We’re living in a new era of cyber-threats - and governments have started to take notice. To protect the information of their citizens, they’re implementing new regulations that hit businesses where it really hurts. Here’s what you need to know.

GDPR: Workflow Processes Can Help With Data Management

The GDPR is a de facto mandate for every company to invest in process automation software. How can business workflows help with privacy compliance? Read to learn more.

Equifax: 5th Largest Data Breach Ever and Their Troubles Don't End There

As of writing this article on Thursday, September 7th, 2017, yet another corporate mega-breach has been revealed and this time it's the credit-reporting agency, Equifax. Negligence, terrible communications, bad crisis management … someone's head is gonna roll.

Attack of the Drones - Is Your Business Ready?

Call them whatever you prefer—"unmanned aircraft systems" (UAS), "small unmanned aircraft systems" (sUAS), "unmanned aircraft vehicles" (UAV), or simply "drones"—these devices have evolved rapidly over the last few years to the point where they count as a significant force in the innovation of industries ranging from photography and film making, through farming and surveying, to maintenance and power line inspection. "So," you might be thinking "that's all very cool but what's that got to do with my company and security?"

The Internet of Toys. Is Barbie Spying on You?

I just received a review sample of a toy that is—and this is not a word I use lightly—awesome. It's the Cozmo, a small robot that is just amazing. Isn't that adorable? But, what's the catch?

Balancing Security and Privacy in the Enterprise

Enterprise security teams have a namesake job to do – secure their organizations – but it does not have to come at the expense of their colleague’s privacy. How, then, do organizations balance the requirements and expectations of both sides and keep their data secure while ensuring that the company refrains from violating privacy laws?

A Dialogue With Joe Gray, Enterprise Security Consultant

ITSPmagazine recently caught up withJoe Gray, Enterprise Security Consultant at Sword & Shield Enterprise Security. Joe shared his views on personal information sharing, privacy, and the value of community service for information security awareness throughout society.

The Side Effects Of A Technology Craving Society - Part 1

We live in a technology-hungry society where consumers are accustomed to the convenience of technology without understanding the risks and vulnerabilities that come with it. In this part 1 of 2 InfoSec Life articles, Phil Agcaoili, CISO, discusses the five core issues of basic cyber hygiene.

When You Give, You Get. The Power of Mentoring

Elena Elkina believes that even the most experienced and confident professional can use good career advice, and there’s no better way than through mentoring. Whether it is formalized or non-traditional mentorship, Elena provides a guide to looking for a mentor and reminds us that when you give, you get.

Cyber Threats Have Evolved. How About Your Insurance?

Great advancements have been made in cyber risk insurance since the first policies were introduced nearly two decades ago. Options available in 2017 offer organizations the ability to not only survive a data breach but the resources and finances to swiftly take it head on and win. Cyber threats have evolved but has your approach to insurance?

Think About It: Messenger's Live Location, and Other Privacy Issues on Facebook

The new Facebook Messenger "live location" feature comes in handy when coordinating plans with friends, as it lets users share their real-time location on a map within a private/group message. But what kind of security vulnerabilities are consumers voluntarily opening themselves up to?

Your Personal CyberSecurity Needs You. Learn How To Enhance Your iPhone Security

What are some easy ways to enhance your iPhone security? Readers will learn how to protect their iPhones and the sensitive information that can be stored on these devices.

Cybersecurity Is About Privacy, Empathy, and the Real World

Technology entrepreneur Vishal Gupta explains how living by the principles of empathizing with the individuals whose data his firm is charged with protecting frames the way he approaches his InfoSec Life.

There Is No Standard Career In Cybersecurity. However...

Many are lured by the fascinating and lucrative field of cybersecurity, but the prerequisites for entry-level positions are often daunting. Learn from expert Mikhael Felker how to gain experience that will position you for a successful career in InfoSec.

I Am Not a Number, I Am a Free Man. The Devaluation of Personal Identity

In our constant crusade to stop cybercrime and fight the good fight against our invisible enemy, we (the good guys) seem to have lost sight of one of the most important things we are trying to protect.

How a Cold War Russia Child Became a Privacy Expert in the USA

Privacy and data protection expert Elena Elkina shares her remarkable story of a how a life behind fences and daily phone taps in Cold War Russia pushed her on a quest to not only find her own identity, but into a career in the privacy field.

There Is Gender Equality in the Privacy Field...But Will it Last?

The relatively new field of privacy is a striking example of a profession that gets gender equity right. Will this equality last or will the industry slowly laud more men as leaders like the InfoSec space?

Security Versus Convenience: A 1-on-1 with Chenxi Wang

Chenxi Wang, Chief Strategy Officer of Twistlock, weighs in on the risk versus benefit trade-off of sending personal information online, why no security system is safe 100% of the time, and whether Apple is being too stubborn or the FBI is being too “Big Brothery” when it comes to privacy versus security.