Why banning TikTok will not solve data security challenges

Why banning TikTok will not solve data security challenges

TikTok, the social media platform owned by the Beijing-based company ByteDance, has come under fire from Washington, D.C. lawmakers. Legislation signed into effect on April 24 includes a provision that requires ByteDance to sell the social media app in the next nine to twelve months or be banned in the United States. According to the Associated Press, the ban would not go into effect for at least a year and will likely take longer due…

Read More

Security isn’t convenient, and that’s a big problem in the age of AI

Security isn’t convenient, and that’s a big problem in the age of AI

Security isn’t convenient. For most of us, traditional cybersecurity protocols like CAPTCHAs, two-factor authentication and passwords can feel like barriers that stand in the way of productivity. Whether that’s making a purchase, accessing workplace data or trying to log into an app that you were inadvertently kicked out of — we want what we want, we want it now and we often want it at the expense of our own data security and privacy. In…

Read More

Get an Extra 20% Off a Lifetime of Powerful VPN Protection Through 4/7

Get an Extra 20% Off a Lifetime of Powerful VPN Protection Through 4/7

TL;DR: Protect your business’s data and privacy with a lifetime subscription to OysterVPN. It’s currently available to new users for the best-on-web price of just $32 with coupon code SECURE20 through April 7. There are three important reasons for businesses to use a VPN: to keep your work data safe from hackers, to protect your privacy by preserving anonymity online and to consume content that is inaccessible wherever you happen to be. However, not all…

Read More

The future of data privacy and compliance (and how to stop it)

The future of data privacy and compliance (and how to stop it)

With 2024 upon us, experts are once again sharing best practices for adapting your business’ data strategy to the times. From ensuring compliance with state-by-state privacy laws to preparing for the inevitable removal of third-party cookies over the course of the year, organizations face ever-increasing pressure to adapt to new realities. Still, mere compliance isn’t enough: the winners will be those who can follow the rules without sacrificing their ability to glean valuable insights or…

Read More

Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security

Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security

CISOs know best practice information security management comes down to people as much as technology. Without employees and a robust security culture on your side, tech deployment will not stop threat actors, who continue to find their way into organisations. It appears Asia-Pacific employees are not getting the message. Cyber security company Proofpoint recently surveyed 7,500 employees and 1,050 security professionals in 15 countries, including Australia, Japan, South Korea and Singapore. The company found that…

Read More

Tap into connection points between security and privacy

Tap into connection points between security and privacy

Data privacy and information security are both critical components of building customer trust for organizations. Privacy protects our personal data and empowers us to control its use, while security shields information against unauthorized access and threats. Balancing these needs is key, like finding the sweet spot between convenience and robust protection. In the face of challenges posed by emerging technologies, evolving regulations and the escalating volume of data, privacy and security teams often find themselves…

Read More

Jorge Mario Ochoa | Top Cybersecurity Leaders 2024

Jorge Mario Ochoa | Top Cybersecurity Leaders 2024

Learning is a lifelong process and is something Jorge Mario Ochoa has certainly taken to heart. The cybersecurity leader complements his knowledge with master’s degrees in seven disciplines including leadership, business administration, project management, talent management, big data and data analysis, cybersecurity, artificial intelligence and deep learning, as well as a Ph.D. in psychology. Jorge Mario considers a well-rounded education an important tool for cybersecurity professionals. “I am a firm advocate for education and collaboration,”…

Read More

Balancing data privacy and security in the age of AI-powered defenses

Balancing data privacy and security in the age of AI-powered defenses

Cyber threats are always evolving. Not only has artificial intelligence (AI) lowered the bar required to launch an attack, but adversaries are also using the technology to enhance the speed and sophistication of their tactics — through methods like code generation, password cracking, social engineering, phishing attempts and more. For example, hackers can use generative AI to build convincing profiles on social media platforms, making it easier for hackers to impersonate individuals or create fake…

Read More

Today’s SIEM data challenges require data decoupling

Today’s SIEM data challenges require data decoupling

Today’s SIEM data challenges require data decoupling | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Unlocking Industrial Data: The EU Data Act

Unlocking Industrial Data: The EU Data Act

On November 27, the European Council adopted the EU Data Act. Part of the larger EU Data Strategy to infuse competition and drive more data-driven innovation within the region, the Data Act will make data generated by connected devices and related services (industrial data) accessible to EU consumers and companies. Rules and regulations around data governance are not new. There are already laws in place to protect personal or classified data and to open up…

Read More
1 2 3 13