“Although GDPR is much better than previous legislation, particularly with regard to enforcement, there’s still some lack of clarity on issues like online tracking. Hopefully this will be dealt with over time. Obviously, it’s not ideal that companies are still stalking users as they surf the internet.” Joe McNamee, Executive Director, EDRi (European Digital Rights)...
With personal data fetching high prices on the dark web, the Internet of Things creating additional, potentially vulnerable access points to networks, and human fallibility, hackers have more reasons and opportunities than ever to steal digital information. Secure Channel uses real-time encryption to protect data, rendering it useless to unauthorized access. Please tell us a...
With the deadline for enforcement of the European Union’s General Data Protection Regulation (GDPR) quickly approaching, businesses engaging with consumers in the EU must implement compliance, or face fines that could potentially bankrupt them. Ensighten’s GDPR Website Compliance tools are designed to help these companies fulfill GDPR requirements regarding the collection, storage, and use of...
Today’s companies spend a lot of money on technology and devices to keep their information safe from bad actors that intend reputational or financial harm. But no matter how good the technology in place may be, it is imperative that companies set policies assuring that none of their practices inadvertently open a door and release...
I recently sat down with Taha Smily, an independent cybersecurity researcher to talk about the role he and other members of a new generation of ethical hackers play in keeping sites secure. Please tell me a little bit about yourself and how you got involved in cybersecurity research. My name is Taha Smily; I’m an...
As the work environment becomes increasingly mobile, and more devices than ever before are connecting to company networks, security challenges are increasing exponentially.  Rohde & Schwarz Cybersecurity has developed technologies to keep networks secure by isolating sensitive data from the open internet while allowing employees to continue to use their applications without any additional steps...
Now that U.S. government agencies are required to migrate to the cloud, they must assure their information remains secure. And with many agencies having dozens, if not hundreds, of systems and limited manpower, manually fulfilling security requirements and continuing to monitor them for compliance is nearly impossible. cFocus Software’s proprietary software ATO (Authority To Operate)...
Professional attackers wanting to exploit legitimate social media users are mass registering abusive user accounts in ways that they appear legitimate. Trying to detect these abusive accounts individually before they can do any damage is nearly impossible. DataVisor’s proprietary algorithm takes a new approach by analyzing multiple dimensions across multiple accounts and uncovering the hidden...
With cybercriminals becoming increasingly sophisticated in accessing all our connected devices and personal data, the traditional antivirus approach is simply unable to keep up with recognizing and stopping the constant emergence of new threats. We sat down with BullGuard’s CEO Paul Lipman to talk about their next generation engine and how it is continually learning...
Despite advances in data security, many of the world’s largest companies still fall prey to data breaches. Troy Hunt, the founder of Have I Been Pwned, tells us how these breaches occur, how stolen data is used, its impact on corporations and individuals, and most importantly – gives us the tools to know if our...