Privacy - Tagged - Security Boulevard
Data Security Risks in The Next Decade and How to Prepare for Them

Data Security Risks in The Next Decade and How to Prepare for Them

Almost all decisions and strategies in modern organizations are data-driven. Data breaches that make the data inaccessible can therefore tamper with normal company operations. Also, if it gets in the wrong hands, ...

Using Foreign Nationals to Bypass US Surveillance Restrictions

Remember when the US and Australian police surreptitiously owned and operated the encrypted cell phone app ANOM? They arrested 800 people in 2021 based on that operation. New documents received by Motherboard ...
GUEST ESSAY: JPMorgan’s $200 million in fines stems from all-too-common compliance failures

GUEST ESSAY: JPMorgan’s $200 million in fines stems from all-too-common compliance failures

Last month’s $125 million Security and Exchange Commission (SEC) fine combined with the $75 million U.S. Commodity Futures Trading Commission (CFTC) fine against JPMorgan sent shockwaves through financial and other regulated customer-facing ...
‘Shame on You, Moxie Marlinspike’—Fake Cash Scheme Pollutes Signal Nonprofit

‘Shame on You, Moxie Marlinspike’—Fake Cash Scheme Pollutes Signal Nonprofit

Creator of the Signal encrypted messaging app, Moxie Marlinspike, is suddenly stepping down as CEO of Signal. Some say greed has turned him. Are the critics fair? You decide ...
Security Boulevard
GUEST ESSAY: 5 tips for ‘de-risking’ work scenarios that require accessing personal data

GUEST ESSAY: 5 tips for ‘de-risking’ work scenarios that require accessing personal data

Working with personal data in today’s cyber threat landscape is inherently risky. Related: The dangers of normalizing encryption for government use It’s possible to de-risk work scenarios involving personal data by carrying ...

Edward Snowden Privacy Update | Avast

| | Privacy, Security News
Edward Snowden and Pulitzer Prize-winning journalists Glenn Greenwald and Chris Hedges have recently come together in a video conference call moderated by Amy Goodman of Democracy Now. In the video, the group ...
Phone Scam Targets Psychologists, All My Apes Gone, Supply Chain Skimmer Attack

Phone Scam Targets Psychologists, All My Apes Gone, Supply Chain Skimmer Attack

A phone scam targeting psychologists reveals that even professionals can become victims, stolen multi-million-dollar NFT’s results in a “all my apes gone” plea for help, and details on a skimmer supply chain ...
Facebook/Google use Dark Patterns in Cookie Consent—says France, Waving $240M Fines

Facebook/Google use Dark Patterns in Cookie Consent—says France, Waving $240M Fines

Yes, the French are revolting (again): France plans to hit Google and Facebook/Meta with $240 million in fines (€210M) ...
Security Boulevard
GUEST ESSAY: Going beyond watermarks to protect sensitive documents from illegal access

GUEST ESSAY: Going beyond watermarks to protect sensitive documents from illegal access

Cyber threats continue to gain momentum and there are still not enough ways to counter it. Related: Why the ‘Golden Age’ of cyber espionage is upon us. The global threat intelligence market ...
MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously

MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously

APIs are putting business networks at an acute, unprecedented level of risk – a dynamic that has yet to be fully acknowledged by businesses. Related: ‘SASE’ framework extends security to the network ...