Identity access management and security services to drive worldwide spending growth.
The FTC is hosting a workshop on “informational injury,” asking about the “qualitatively different types of injuries” consumers experience “from privacy and data security incidents.”
Hikvision, a company 42%-owned by the Chinese government, sold devices that monitor U.S. Army base and Memphis streets. That has sparked concerns about cybersecurity.
Without the trust of consumers, third parties requiring consumer consent to use new rights of access to bank and payment account data will struggle to make an impact in the market.
Phishing beats keylogging as a means of hijacking email credentials, Google has found in a study.
Anyone casually surfing the internet at home can be deployed as an unwittingly productive member of a hacker’s workforce, a practice known as “cryptojacking” that is on the rise.
Internet-connected products can be used to eavesdrop on families or even communicate with children.
Google researchers develop a fast way to alert you to a stranger spying over your shoulder.
Like the idea of Amazon Echo and Google Home, but feel uneasy about all that recording? Here’s what they listen to—and how to delete it.
As the calendar year comes to a close, many of us in the privacy field find ourselves tending to year-end tasks, planning for the start of a fresh first quarter, and reflecting on the last 12 months of work. Year-end program statistics are gathered, budgets for the next year loom on the horizon, and measuring and demonstrating the efficacy of your compliance program to internal and external stakeholders becomes top of mind. In short, this is an excellent time to consider privacy program metrics.