personal data
Critical SSH Vulnerability, Facial Recognition Flaws, How to Safely Dispose of Old Devices
In episode 337, we cover “broken” news about the new SSH vulnerability ‘regreSSHion‘ highlighting the vulnerability discovered in the OpenSSH protocol by Qualys and its implications. We then discuss the Detroit Police ...
Beyond DLP: Embracing a Multi-Layered Strategy for Personal Data Security
DLP plays an important role, but it's not the only necessary component in a robust data protection strategy ...
The FBI’s Qakbot Takedown, QR Code Phishing Attacks, Dox Anyone in America for $15
In this episode we discuss the FBI’s remarkable takedown of the Qakbot botnet, a saga involving ransomware, cryptocurrency, and the FBI pushing an uninstaller to thousands of victim PCs. Next, we explore ...
An Overview of Connecticut SB 1103 | An Act Concerning Artificial Intelligence, Automated Decision-Making and Personal Data Privacy
Introduction On June 7, 2023, Connecticut Governor Ned Lamont signed Senate Bill No. 1103 – An Act Concerning Artificial Intelligence, Automated Decision-Making and Personal Data Privacy, a landmark law that will increase ...
What’s personal data and how do you protect it?
The post What’s personal data and how do you protect it? appeared first on Click Armor ...
Top five insights from the 2021 CyberEdge Cyberthreat Defense Report
For the last eight years, the Cyberthreat Defense Report has been helping enterprise security professionals gauge their internal practices and security investments against their peers across multiple countries and industries. The report ...
Why adopt a data-centric solution for data privacy?
Enterprises understand the importance of having access to their consumers’ personal information. This data enables them to more easily build personal relationships with their audiences, using what they know about that audience ...
3 data flow mapping challenges to comply with the GDPR
As part of your GDPR (General Data Protection Regulation) compliance project, your organisation must understand what personal data it processes. To help you do this, you must create a data flow map. A data flow ...
What Happens to Your Personal Data after Deleting an App
Over the last decade or so, apps have become a familiar and comfortable aspect of our everyday lives. We download them to our smartphones and tablet devices and swap them out whenever ...