Data Privacy
Data Classification Policy: Definition, Examples, & Free Template
Editor’s note: this piece was updated with fresh information in August 2021. It was originally published in November, 2020. It’s 3 AM. Do you know where your most sensitive data is? More ...
TEGWAR, AI and the FTC – Gov’t Agency Warns of Deceptive AI Contract Language
Data collection and use policies need to be reexamined because of AI. The FTC is trying to address the issue ...
Security Boulevard
25.6 Million Dollar Deepfake Scam, Exploring Canada’s Flipper Zero Ban
Tom Eston | | AGI, AI, canada, Canadian Government, Car Thefts, cars, Cyber Security, Cybersecurity, Data Privacy, deepfake, deepfakes, Digital Privacy, Episodes, Flipper Zero, Information Security, Infosec, Podcast, Podcasts, Privacy, scam, Scams, security, Stolen Cars, technology, Thefts, Weekly Edition
In episode 317, Tom and Kevin discuss a reported deepfake scam that allegedly led to the theft of 25.6 million from a multinational company and Canada’s attempt to ban the Flipper Zero ...
FTC Warns AI Companies About Changing Policies to Leverage User Data
The Federal Trade Commission is warning AI companies against secretly changing their security and privacy policies in hopes of leveraging the data they collect from customers to feed models they use to ...
Security Boulevard
Jason Haddix on Bug Bounties and Cybersecurity Career Growth
Tom Eston | | Arcanum Information Security, Bug Bounties, bug bounty, career, career growth, Cyber Security, Cybersecurity, cybersecurity career, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, Jason Haddix, jobs, mentors, Mentorship, Podcast, Podcasts, Privacy, security, technology, Weekly Edition
In episode 316, we have the pleasure to chat with Jason Haddix, a prominent influencer in the cybersecurity community. With an intriguing career path, from being a ‘computer kid’, venturing into the ...
Cybersecurity Insights with Contrast CISO David Lindner | 2/9/24
Insight #1 From toasters to toothbrushes, the Internet of Things (IoT) continues to wreak havoc on the internet. As consumers, it's important to balance necessity with risk, just like with everything else. ...
The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices
Tom Eston | | 23andMe, Andra Zaharia, Cyber Empathy Podcast, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, DNA, empathy, Episodes, Ethics, Information Security, Infosec, Pentest Tools, Podcast, Podcasts, Privacy, responsibility, security, technology, Victim Blaming, We Think We Know Podcast, Weekly Edition
In this episode of the Shared Security Podcast, we discuss the concerning issue of victim-blaming in cybersecurity with special guest, Andra Zaharia, host of the Cyber Empathy and We Think We Know ...
Aim Security to Limit Exposure of Sensitive Data to Generative AI Services
Michael Vizard | | AI models, Aim Security, Data Privacy, data protection, Data Security, generative AI, LLMs
Aim Security leverages LLMs to prevent end users from inadvertently sharing sensitive data or IP with a generative AI platforms ...
Security Boulevard
Facebook’s Extensive Surveillance Network
Bruce Schneier | | Data Privacy, facebook, Meta, Privacy, Reports, surveillance, tracking, Uncategorized
Consumer Reports is reporting that Facebook has built a massive surveillance network: Using a panel of 709 volunteers who shared archives of their Facebook data, Consumer Reports found that a total of ...
CFPB’s Proposed Data Rules
In October, the Consumer Financial Protection Bureau (CFPB) proposed a set of rules that if implemented would transform how financial institutions handle personal data about their customers. The rules put control of ...