Vector image of characters working on a computer

Data Classification Policy: Definition, Examples, & Free Template

Editor’s note: this piece was updated with fresh information in August 2021. It was originally published in November, 2020. It’s 3 AM. Do you know where your most sensitive data is? More ...
FTC privacy data game baseball

TEGWAR, AI and the FTC – Gov’t Agency Warns of Deceptive AI Contract Language

Data collection and use policies need to be reexamined because of AI. The FTC is trying to address the issue ...
Security Boulevard
25.6 Million Dollar Deepfake Scam, Exploring Canada's Flipper Zero Ban

25.6 Million Dollar Deepfake Scam, Exploring Canada’s Flipper Zero Ban

In episode 317, Tom and Kevin discuss a reported deepfake scam that allegedly led to the theft of 25.6 million from a multinational company and Canada’s attempt to ban the Flipper Zero ...
FTC ai data privacy

FTC Warns AI Companies About Changing Policies to Leverage User Data

The Federal Trade Commission is warning AI companies against secretly changing their security and privacy policies in hopes of leveraging the data they collect from customers to feed models they use to ...
Security Boulevard

Jason Haddix on Bug Bounties and Cybersecurity Career Growth

In episode 316, we have the pleasure to chat with Jason Haddix, a prominent influencer in the cybersecurity community. With an intriguing career path, from being a ‘computer kid’, venturing into the ...
Cybersecurity Insights with Contrast CISO David Lindner | 2/9/24

Cybersecurity Insights with Contrast CISO David Lindner | 2/9/24

Insight #1 From toasters to toothbrushes, the Internet of Things (IoT) continues to wreak havoc on the internet. As consumers, it's important to balance necessity with risk, just like with everything else.  ...
The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices

The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices

In this episode of the Shared Security Podcast, we discuss the concerning issue of victim-blaming in cybersecurity with special guest, Andra Zaharia, host of the Cyber Empathy and We Think We Know ...
Synopsys Aim open source Microsoft data human cybersecurity organizations disaster cybersecurity ransomware HelpSystems human side of cybersecurity

Aim Security to Limit Exposure of Sensitive Data to Generative AI Services

Aim Security leverages LLMs to prevent end users from inadvertently sharing sensitive data or IP with a generative AI platforms ...
Security Boulevard

Facebook’s Extensive Surveillance Network

Consumer Reports is reporting that Facebook has built a massive surveillance network: Using a panel of 709 volunteers who shared archives of their Facebook data, Consumer Reports found that a total of ...

CFPB’s Proposed Data Rules

In October, the Consumer Financial Protection Bureau (CFPB) proposed a set of rules that if implemented would transform how financial institutions handle personal data about their customers. The rules put control of ...