Anton’s Security Blog Quarterly Q3.5 2020

Anton’s Security Blog Quarterly Q3.5 2020

Sometimes great old blog posts are hard to find (especially on Medium), so I decided to do a periodic (who am I kidding, occasional — not periodic) list blog with my favorite posts of ...

The 5 Best Ways to Handle Sensitive Data

There are two significant trends occurring right now that shouldn’t be a surprise to anyone reading this post. First, businesses are gathering and leveraging more and more data to improve their core ...

Achieving Compliance with Qatar’s National Information Assurance Policy

Qatar is one of the wealthiest countries in the world. Finances Online, Global Finance Magazine and others consider it to be the wealthiest nation. This is because the country has a small ...

Preventing Shadow IT from Blindsiding your Zero Trust Plan

I’ve spoken before about Zero Trust approaches to security, but for many of those starting on their journey, there isn’t an obvious place to start with the model. With this post, I ...
What does Chocolate Have to do With Maintaining Privacy Regulations…

What does Chocolate Have to do With Maintaining Privacy Regulations…

Ever since the murmurings regarding GDPR began in 2016, achieving privacy compliance has become a common discussion (well, at least among CISOs and CIOs). While lots and lots of ink has been ...
data privacy

Data Privacy and COVID-19: What You Need to Know

Offering personal information today to help eradicate COVID-19 should not result in a loss of data privacy in the future During the current COVID-19 pandemic, data is the thread that connects everyone ...
Security Boulevard
Data Flow Mapping Tool – Instructional Video

5 steps to create a data flow map

As part of your GDPR (General Data Protection Regulation) compliance project, you must be able to understand what personal data you process. Specifically, Article 30 states that you must “maintain a record ...
TikTok

TikTok and National Security: The Need for a Comprehensive U.S. Privacy Law

| | data, Privacy, social media
Last week, President Donald Trump threatened to ban the popular social media platform TikTok, whose corporate owner is a Chinese company with alleged ties to the Chinese Communist Party. Trump’s stated grounds ...
Security Boulevard

How Big Tech Collects Your Private Data and How to Delete It

In episode 132 for August 3rd 2020: How the big tech companies like Google, Apple, Facebook, and Twitter collect your private data and how you can delete it with Kira Rakova from ...
Sextortionists Using Social Engineering Tactics to Collect Victims’ Data

Sextortionists Using Social Engineering Tactics to Collect Victims’ Data

Security researchers observed sextortionists leveraging social engineering techniques to steal their victims’ personal information. SANS’ Internet Storm Center (ISC) discovered that sextortionists had begun creating profiles for young women on dating websites ...