data
Anton’s Security Blog Quarterly Q3.5 2020
Sometimes great old blog posts are hard to find (especially on Medium), so I decided to do a periodic (who am I kidding, occasional — not periodic) list blog with my favorite posts of ...
The 5 Best Ways to Handle Sensitive Data
There are two significant trends occurring right now that shouldn’t be a surprise to anyone reading this post. First, businesses are gathering and leveraging more and more data to improve their core ...
Achieving Compliance with Qatar’s National Information Assurance Policy
Qatar is one of the wealthiest countries in the world. Finances Online, Global Finance Magazine and others consider it to be the wealthiest nation. This is because the country has a small ...
Preventing Shadow IT from Blindsiding your Zero Trust Plan
I’ve spoken before about Zero Trust approaches to security, but for many of those starting on their journey, there isn’t an obvious place to start with the model. With this post, I ...
What does Chocolate Have to do With Maintaining Privacy Regulations…
Ever since the murmurings regarding GDPR began in 2016, achieving privacy compliance has become a common discussion (well, at least among CISOs and CIOs). While lots and lots of ink has been ...
Data Privacy and COVID-19: What You Need to Know
Offering personal information today to help eradicate COVID-19 should not result in a loss of data privacy in the future During the current COVID-19 pandemic, data is the thread that connects everyone ...
5 steps to create a data flow map
As part of your GDPR (General Data Protection Regulation) compliance project, you must be able to understand what personal data you process. Specifically, Article 30 states that you must “maintain a record ...
TikTok and National Security: The Need for a Comprehensive U.S. Privacy Law
Last week, President Donald Trump threatened to ban the popular social media platform TikTok, whose corporate owner is a Chinese company with alleged ties to the Chinese Communist Party. Trump’s stated grounds ...
How Big Tech Collects Your Private Data and How to Delete It
In episode 132 for August 3rd 2020: How the big tech companies like Google, Apple, Facebook, and Twitter collect your private data and how you can delete it with Kira Rakova from ...
Sextortionists Using Social Engineering Tactics to Collect Victims’ Data
Security researchers observed sextortionists leveraging social engineering techniques to steal their victims’ personal information. SANS’ Internet Storm Center (ISC) discovered that sextortionists had begun creating profiles for young women on dating websites ...

