Facial Recognition Fail: How It Misidentified an Innocent Man

Critical SSH Vulnerability, Facial Recognition Flaws, How to Safely Dispose of Old Devices

In episode 337, we cover “broken” news about the new SSH vulnerability ‘regreSSHion‘ highlighting the vulnerability discovered in the OpenSSH protocol by Qualys and its implications. We then discuss the Detroit Police ...
data, breaches, data breaches, NetApp data broker FTC location data

Beyond DLP: Embracing a Multi-Layered Strategy for Personal Data Security

DLP plays an important role, but it's not the only necessary component in a robust data protection strategy ...
Security Boulevard

An Overview of Connecticut SB 1103 | An Act Concerning Artificial Intelligence, Automated Decision-Making and Personal Data Privacy

Introduction On June 7, 2023, Connecticut Governor Ned Lamont signed Senate Bill No. 1103 – An Act Concerning Artificial Intelligence, Automated Decision-Making and Personal Data Privacy, a landmark law that will increase ...
Best security practices for social media. Social media device shown.

What’s personal data and how do you protect it?

The post What’s personal data and how do you protect it? appeared first on Click Armor ...

Top five insights from the 2021 CyberEdge Cyberthreat Defense Report

For the last eight years, the Cyberthreat Defense Report has been helping enterprise security professionals gauge their internal practices and security investments against their peers across multiple countries and industries. The report ...

Why adopt a data-centric solution for data privacy?

Enterprises understand the importance of having access to their consumers’ personal information. This data enables them to more easily build personal relationships with their audiences, using what they know about that audience ...
Data Flow Mapping Tool – Instructional Video

3 data flow mapping challenges to comply with the GDPR

As part of your GDPR (General Data Protection Regulation) compliance project, your organisation must understand what personal data it processes. To help you do this, you must create a data flow map. A data flow ...

What Happens to Your Personal Data after Deleting an App

Over the last decade or so, apps have become a familiar and comfortable aspect of our everyday lives. We download them to our smartphones and tablet devices and swap them out whenever ...

Application Security Check Up