Twitter Saudi

Twitter and the Saudi Computer Crime – Or Was It?

What the two Twitter employees’ actions in accessing user data for use by the Saudi Kingdom was not technically a criminal offense On Nov. 7, the United States Department of Justice (DoJ) ...
Security Boulevard
UniCredit leaks 3 million customer records in data breach

UniCredit leaks 3 million customer records in data breach

Italian banking giant UniCredit has suffered a “data incident” that exposed 3 million customer records, including full names, phone numbers and email addresses. UniCredit issued an urgent security notice yesterday announcing that ...
California adds biometric specs to data breach law

California adds biometric specs to data breach law

California is changing its Information Practices Act of 1977 to expand the definition of personal information with additional identifiers, including biometric data of those affected. The amendment comes with new instructions on ...
CCPA

Make Digital ID Verification Part of Your CCPA Strategy

As CCPA is poised to take effect, companies must ensure they don’t put personal information in the wrong hands The lines between the digital and physical world are continuing to blur and ...
Security Boulevard
Al Gore on creating the internet

Your Personally Identifiable Information Is Part of You: Stop Giving It Away

Are hackers really the problem when governments can just ask for or legislate the requirement to turn over user data? Russia currently has approximately 149 million people living in within its borders, ...
digital security small business owners FI

Think Your Business Is Too Small to Get Hacked? Wake Up!

Sixty percent of small- to mid-sized businesses (SMBs) go bankrupt six months after suffering a cyberattack. The risk is simply too great. SMBs need to strengthen their digital security. Uber…Equifax…Yahoo…if you look ...
Cyberattacks Lurking in Every Data Store

It’s Beginning to Look a Lot Like Christmas, with Cyberattacks Lurking in Every Data Store

Based on the holiday song, “It’s Beginning to Look a Lot Like Christmas,” by Meredith Willson It’s beginning to look a lot like Christmas Everywhere you go Take a look at emails ...
Security Boulevard
cryptography

Dark Patterns: Stealth Ways Companies Collect Personal Data

Security experts and security writers talk a lot about how sophisticated cybercriminals are at getting the information they want. But what we don’t talk enough about is how well legitimate companies are ...
Security Boulevard
Microsoft Age of Collaboration

Data Security Spotlight: Protecting Electoral (and Everyday) Data

Intelligence is key to data security in an age where data breaches have gone mainstream Did you vote on Tuesday? Or, were you part of the ​​“nearly one in five Americans” who ...
Security Boulevard
Loading...