Google researchers develop a fast way to alert you to a stranger spying over your shoulder.
Like the idea of Amazon Echo and Google Home, but feel uneasy about all that recording? Here’s what they listen to—and how to delete it.
Image-sharing website Imgur has confirmed that the emails and passwords of 1.7 million users were compromised in 2014.
The aim of new draft Personal Data Processing is to establish legal preconditions for implementing the General Data Protection Regulation in Latvia.
Data protection authorities around the globe participate in a forum known as the International Conference of Data Protection and Privacy Commissioners. To be accepted into the Conference, members must be the highest data protection or privacy enforcement body in their nation, with an appropriate range of legal powers as well as autonomy and independence. Conference members convene annually, participate in working groups and committees, and ultimately develop public resolutions and reports.
The General Data Protection Regulation regulates cross-border processing of personal data. For many organizations, identifying their lead supervisory authority (LSA), the principal EU regulator responsible for enforcement of the GDPR in relation to cross border processing, will be straightforward.
As the calendar year comes to a close, many of us in the privacy field find ourselves tending to year-end tasks, planning for the start of a fresh first quarter, and reflecting on the last 12 months of work. Year-end program statistics are gathered, budgets for the next year loom on the horizon, and measuring and demonstrating the efficacy of your compliance program to internal and external stakeholders becomes top of mind. In short, this is an excellent time to consider privacy program metrics.
Stephen Gates is chief research intelligence Analyst at Zenedge which specialized in cloud-based denial-of-service-attack mitigation, API protection and bot management, among other things. Gates sees an uptick in API attacks and believes API risks are often completely overlooked, meaning hackers could take advantage of vulnerabilities, especially via mobile apps. “Hackers have determined that APIs are untapped territory and often can improve the likelihood of success in achieving their criminal outcomes,” he says.
You may be all too familiar with your organization’s change-management process, the regular steps of review being used, and maybe even the exact wording of its requirements some of which may have remained unchanged for years.