NIST crowdsourcing challenge aims to de-identify public data sets to protect individual privacy
NIST has launched a crowdsourcing challenge to spur new methods to ensure that important public safety data sets can be de-identified to protect individual privacy. The …
Average data queries take too long, yet organizations need daily data insights to make decisions
58% of organizations make decisions based on outdated data, according to an Exasol research. The report reveals that 84% of organizations are under increasing pressure to make …
70% of consumers would cut ties with doctors over unprotected health data
There are growing privacy concerns among Americans due to COVID-19 with nearly 70 percent citing they would likely sever healthcare provider ties if they found that their …
GRC teams have a number of challenges meeting regulatory demands
Senior risk and compliance professionals within financial services company’s lack confidence in the security data they are providing to regulators, according to Panaseer. …
Cyberwarfare predicted to damage the economy in the coming year
71% of CISOs believe cyberwarfare is a threat to their organization, and yet 22% admit to not having a strategy in place to mitigate this risk. This is especially alarming …
Improving privacy of a global genomic data sharing network
A Case Western Reserve University computer and data sciences researcher is working to shore up privacy protections for people whose genomic information is stored in a vast …
Ongoing and initial costs top list of barriers to 5G implementation
5G is set to deliver higher data transfer rates for mission-critical communications and will allow massive broadband capacities, enabling high-speed communication across …
Mobile messengers expose billions of users to privacy attacks
Popular mobile messengers expose personal data via discovery services that allow users to find contacts based on phone numbers from their address book, according to …
GAIA-X to strenghten European digital infrastructure sovereignity
The GAIA-X Initiative announced that it is one step closer to its goal of a trustworthy, sovereign digital infrastructure for Europe, with the official signing of …
What are the most vulnerable departments and sectors to phishing attacks?
While cyber attackers chase down system vulnerabilities and valuable data each passing day, the business world has taken the measures against them. The latest trends and …
Are today’s organizations ready for the data age?
67% of business and IT managers expect the sheer quantity of data to grow nearly five times by 2025, a Splunk survey reveals. The research shows that leaders see the …
Recommendations to enhance subscriber privacy in 5G
There are clear benefits of 5G SIM capabilities to protect the most prominent personal data involved in mobile communications, according to the Trusted Connectivity Alliance. …
Featured news
Sponsored
Don't miss
- EU adopts Cyber Resilience Act to secure connected products
- DORA regulation’s nuts and bolts
- Unlocking the power of cryptographic agility in a quantum world
- Actively exploited Firefox zero-day fixed, update ASAP! (CVE-2024-9680)
- Internet Archive data breach, defacement, and DDoS: Users’ data compromised