Please turn on your JavaScript for this page to function normally.
privacy
Lack of email validation and opt-in processes hinder organizations from achieving compliance

Pathwire released the results of its Data Compliance Survey, a survey of 1,000 IT and marketing decision-makers across the globe on the most common data privacy and compliance …

account
Verifiable credentials are key to the future of online privacy

To realize the full potential of online services, identity verification solutions are required to avoid fraud and boost trust in the systems, for both end users and …

person
User data privacy decisions can be easily manipulated

Data privacy is an important topic in the digitalized economy. Recent policy changes have aimed to strengthen users’ control over their own data. Yet new research from …

vault
Image encryption technique could keep photos safe on popular cloud photo services

The past decade has witnessed scandal after scandal over private images maliciously or accidentally made public. A study from computer scientists at Columbia Engineering …

identity theft
Is differential privacy the ideal privacy-enhancing computation technique for your business?

As security & risk management (SRM) leaders globally adjust to a “new normal” brought about by the COVID-19 pandemic, businesses must adapt their privacy programs for …

medical
How to strike the balance between privacy and personalization in healthcare and beyond

The trade-off between widespread technology adoption and responsible use often lies on the spectrum of privacy. When it comes to technologies fueled by data, such as …

bomb
Cybercriminals customizing malware for attacks on virtual infrastructure

Cyber incidents continue to rise, ransomware accounts for nearly two-thirds of all malware attacks, and more cybercriminals are customizing malware for attacks on virtual …

healthcare
Ensuring HIPAA compliance when using the cloud

Accelerated by the pandemic, health IT has continued to innovate at pace, while having to balance data protection and regulatory rules. However, critical transformations – …

healthcare
Health insurers facing growing risk of customer data theft

The U.S. health insurance industry is facing growing risks from cybersecurity threats due to the increasingly sophisticated techniques used by cybercriminals amid the …

tunnel
What you need to know about transatlantic data transfers

Where does data live and who can access it? This seemingly simple question is, in fact, incredibly complex in the cloud era, as servers often reside abroad and regional data …

Tor Browser
Tor Browser 10.5 improves circumvention for Tor users in censored places

The Tor Project has brought major censorship circumvention and usability changes to the latest release of Tor Browser. The Tor team is on a mission to make Tor easier to use …

fix
How health tech can secure patient data post-CURES Act

It’s the central conundrum at the heart of telehealth: How can patients gain access to their most vital medical records without putting privacy at risk? The question is not …

Don't miss

Cybersecurity news