Please turn on your JavaScript for this page to function normally.
search
Closing the data divide: How to create harmony among data scientists and privacy advocates

Balancing data privacy within an organization is no easy task, particularly for data scientists who need quick access to data, and security and governance teams whose job it …

location services
Users largely unaware of the privacy implications of location tracking

How much personal information can our phone apps gather through location tracking? To answer this question, two researchers – Mirco Musolesi (University of Bologna, …

mobile apps
Researchers propose more secure and private mobile contact tracing

For public health officials, contact tracing remains critical to managing the spread of the coronavirus — particularly as it appears that variants of the virus could be …

numbers
Homomorphic encryption: Myths and misconceptions

One of the challenges with the current pace of innovation is deciphering what is real and what is vaporware. Most of us are understandably skeptical when we hear of technical …

backup
$432.14 billion to be invested in the data center market by 2025

Continued high levels of technology deployment worldwide will result in a proliferation of data created, driving the need for data processing and storage capacity, Frost …

biohazard
Malware increased by 358% in 2020

A research study conducted by Deep Instinct reports on the hundreds of millions of attempted cyberattacks that occurred every day throughout 2020 showing malware increased by …

network
Have we put too much emphasis on protecting the network?

Recently, much of the cybersecurity commentary and blogs have talked about new approaches for protecting the network, especially beyond the perimeter. For the past few years, …

privacy
Big Tech will try to pre-empt harsh privacy laws by writing their own

Over the past decade, the firms that make up the so-called Big Tech have captured enough of the global economy to resemble industrial cartels from a bygone era. Amazon, Apple, …

data
Runtime data no longer has to be vulnerable data

Today, the security model utilized by nearly all organizations is so weak that the mere act of creating new data comes with the immutable assumption that such data will become …

lock
Most are concerned about data privacy, but few are willing to change habits

Today’s consumers are willing to trade their personal data for personalization, but also have fast-growing concerns about data privacy, according to a survey by Entrust. In …

NIST
NIST provides guidance to protect controlled unclassified information

Nations around the world are adding cyberwarfare to their arsenal, employing highly skilled teams to launch attacks against other countries. These adversaries are also called …

cloud
One-third of businesses have cloud budget overruns of up to 40%

More than one-third of businesses have cloud budget overruns of up to 40 percent, and one in 12 companies exceed this number, a Pepperdata survey of 750 senior enterprise IT …

Don't miss

Cybersecurity news