We’re living in a new era of cyber-threats - and governments have started to take notice. To protect the information of their citizens, they’re implementing new regulations that hit businesses where it really hurts. Here’s what you need to know.
The GDPR is a de facto mandate for every company to invest in process automation software. How can business workflows help with privacy compliance? Read to learn more.
Imagine for a moment you had a twin that you didn’t know about. A virtual copy of you that shopped where you shopped, read what you read, and was interested in exactly the same things you were. For all intents and purposes, this twin was you but with one big difference; this copy of you cared almost nothing about your privacy. Surprise! This copy of you exists and isn’t going away any time soon. So… now what? Well, for starters, you should read this Q&A between Jason Elrod and Sean Martin.
As of writing this article on Thursday, September 7th, 2017, yet another corporate mega-breach has been revealed and this time it's the credit-reporting agency, Equifax. Negligence, terrible communications, bad crisis management … someone's head is gonna roll.
Call them whatever you prefer—"unmanned aircraft systems" (UAS), "small unmanned aircraft systems" (sUAS), "unmanned aircraft vehicles" (UAV), or simply "drones"—these devices have evolved rapidly over the last few years to the point where they count as a significant force in the innovation of industries ranging from photography and film making, through farming and surveying, to maintenance and power line inspection. "So," you might be thinking "that's all very cool but what's that got to do with my company and security?"
I just received a review sample of a toy that is—and this is not a word I use lightly—awesome. It's the Cozmo, a small robot that is just amazing. Isn't that adorable? But, what's the catch?
Enterprise security teams have a namesake job to do – secure their organizations – but it does not have to come at the expense of their colleague’s privacy. How, then, do organizations balance the requirements and expectations of both sides and keep their data secure while ensuring that the company refrains from violating privacy laws?
ITSPmagazine recently caught up withJoe Gray, Enterprise Security Consultant at Sword & Shield Enterprise Security. Joe shared his views on personal information sharing, privacy, and the value of community service for information security awareness throughout society.
We live in a technology-hungry society where consumers are accustomed to the convenience of technology without understanding the risks and vulnerabilities that come with it. In this part 1 of 2 InfoSec Life articles, Phil Agcaoili, CISO, discusses the five core issues of basic cyber hygiene.
Elena Elkina believes that even the most experienced and confident professional can use good career advice, and there’s no better way than through mentoring. Whether it is formalized or non-traditional mentorship, Elena provides a guide to looking for a mentor and reminds us that when you give, you get.
Great advancements have been made in cyber risk insurance since the first policies were introduced nearly two decades ago. Options available in 2017 offer organizations the ability to not only survive a data breach but the resources and finances to swiftly take it head on and win. Cyber threats have evolved but has your approach to insurance?
The new Facebook Messenger "live location" feature comes in handy when coordinating plans with friends, as it lets users share their real-time location on a map within a private/group message. But what kind of security vulnerabilities are consumers voluntarily opening themselves up to?
What are some easy ways to enhance your iPhone security? Readers will learn how to protect their iPhones and the sensitive information that can be stored on these devices.
Technology entrepreneur Vishal Gupta explains how living by the principles of empathizing with the individuals whose data his firm is charged with protecting frames the way he approaches his InfoSec Life.
Many are lured by the fascinating and lucrative field of cybersecurity, but the prerequisites for entry-level positions are often daunting. Learn from expert Mikhael Felker how to gain experience that will position you for a successful career in InfoSec.
In our constant crusade to stop cybercrime and fight the good fight against our invisible enemy, we (the good guys) seem to have lost sight of one of the most important things we are trying to protect.
Breaking into a computer is like breaking into a house. However, breaking into a smartphone is like breaking into a brain. What does this mean? Expert Kevin Haley explains.
Privacy and data protection expert Elena Elkina shares her remarkable story of a how a life behind fences and daily phone taps in Cold War Russia pushed her on a quest to not only find her own identity, but into a career in the privacy field.
The relatively new field of privacy is a striking example of a profession that gets gender equity right. Will this equality last or will the industry slowly laud more men as leaders like the InfoSec space?
Chenxi Wang, Chief Strategy Officer of Twistlock, weighs in on the risk versus benefit trade-off of sending personal information online, why no security system is safe 100% of the time, and whether Apple is being too stubborn or the FBI is being too “Big Brothery” when it comes to privacy versus security.