Unchecked AI threatens consumer privacy — Regulation is crucial

Unchecked AI threatens consumer privacy — Regulation is crucial

As artificial intelligence (AI) becomes increasingly embedded into society — at home and in the office — through virtual assistants, automated services and workplace productivity tools, there is a pressing need for regulatory guardrails and governance policies to protect consumer privacy and data rights. Corporate AI adoption presents organizations with a rising threat of potential privacy violations. Shockingly, 45% of surveyed organizations have experienced unintended data exposure when implementing AI systems — a harsh reality…

Read More

Security leaders respond to the AT&T data breach

Security leaders respond to the AT&T data breach

On July 12, 2024, AT&T announced the records of calls and text messages of almost all AT&T cellular customers were compromised via a third-party cloud platform. According to a statement made by AT&T, the compromised data does not contain the content of the calls and text messages. It also does not contain personally identifiable information such as Social Security numbers, dates of birth or customer names. At this time, AT&T states there is no indication…

Read More

From check-in to check-out: Ensuring cybersecurity in hospitality

From check-in to check-out: Ensuring cybersecurity in hospitality

The hospitality industry has embraced technological advancements to enhance the guest experience, from automated check-in systems to smart devices in guest rooms. But there are hidden costs that guests need to bear at the expense of these innovations since new cybersecurity risks get introduced at every stage of the guest journey. In modern hospitality settings, the guest journey is increasingly digital, starting from the moment they book a room to the time they check out….

Read More

Why banning TikTok will not solve data security challenges

Why banning TikTok will not solve data security challenges

TikTok, the social media platform owned by the Beijing-based company ByteDance, has come under fire from Washington, D.C. lawmakers. Legislation signed into effect on April 24 includes a provision that requires ByteDance to sell the social media app in the next nine to twelve months or be banned in the United States. According to the Associated Press, the ban would not go into effect for at least a year and will likely take longer due…

Read More

Security isn’t convenient, and that’s a big problem in the age of AI

Security isn’t convenient, and that’s a big problem in the age of AI

Security isn’t convenient. For most of us, traditional cybersecurity protocols like CAPTCHAs, two-factor authentication and passwords can feel like barriers that stand in the way of productivity. Whether that’s making a purchase, accessing workplace data or trying to log into an app that you were inadvertently kicked out of — we want what we want, we want it now and we often want it at the expense of our own data security and privacy. In…

Read More

Get an Extra 20% Off a Lifetime of Powerful VPN Protection Through 4/7

Get an Extra 20% Off a Lifetime of Powerful VPN Protection Through 4/7

TL;DR: Protect your business’s data and privacy with a lifetime subscription to OysterVPN. It’s currently available to new users for the best-on-web price of just $32 with coupon code SECURE20 through April 7. There are three important reasons for businesses to use a VPN: to keep your work data safe from hackers, to protect your privacy by preserving anonymity online and to consume content that is inaccessible wherever you happen to be. However, not all…

Read More

The future of data privacy and compliance (and how to stop it)

The future of data privacy and compliance (and how to stop it)

With 2024 upon us, experts are once again sharing best practices for adapting your business’ data strategy to the times. From ensuring compliance with state-by-state privacy laws to preparing for the inevitable removal of third-party cookies over the course of the year, organizations face ever-increasing pressure to adapt to new realities. Still, mere compliance isn’t enough: the winners will be those who can follow the rules without sacrificing their ability to glean valuable insights or…

Read More

Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security

Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security

CISOs know best practice information security management comes down to people as much as technology. Without employees and a robust security culture on your side, tech deployment will not stop threat actors, who continue to find their way into organisations. It appears Asia-Pacific employees are not getting the message. Cyber security company Proofpoint recently surveyed 7,500 employees and 1,050 security professionals in 15 countries, including Australia, Japan, South Korea and Singapore. The company found that…

Read More

Tap into connection points between security and privacy

Tap into connection points between security and privacy

Data privacy and information security are both critical components of building customer trust for organizations. Privacy protects our personal data and empowers us to control its use, while security shields information against unauthorized access and threats. Balancing these needs is key, like finding the sweet spot between convenience and robust protection. In the face of challenges posed by emerging technologies, evolving regulations and the escalating volume of data, privacy and security teams often find themselves…

Read More

Jorge Mario Ochoa | Top Cybersecurity Leaders 2024

Jorge Mario Ochoa | Top Cybersecurity Leaders 2024

Learning is a lifelong process and is something Jorge Mario Ochoa has certainly taken to heart. The cybersecurity leader complements his knowledge with master’s degrees in seven disciplines including leadership, business administration, project management, talent management, big data and data analysis, cybersecurity, artificial intelligence and deep learning, as well as a Ph.D. in psychology. Jorge Mario considers a well-rounded education an important tool for cybersecurity professionals. “I am a firm advocate for education and collaboration,”…

Read More
1 2 3 14