Security leaders respond to the AT&T data breach

Security leaders respond to the AT&T data breach

On July 12, 2024, AT&T announced the records of calls and text messages of almost all AT&T cellular customers were compromised via a third-party cloud platform. According to a statement made by AT&T, the compromised data does not contain the content of the calls and text messages. It also does not contain personally identifiable information such as Social Security numbers, dates of birth or customer names. At this time, AT&T states there is no indication…

Read More

Why mobile app developers need to prioritize user data privacy and security — and what they can do to ensure it

Why mobile app developers need to prioritize user data privacy and security — and what they can do to ensure it

Why mobile app developers need to prioritize user data privacy and security — and what they can do to ensure it This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated…

Read More

Vaccine passports: Our saving grace, or a privacy nightmare?

Vaccine passports: Our saving grace, or a privacy nightmare?

Vaccine passports: Our saving grace, or a privacy nightmare? | 2021-06-07 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Key considerations for contact tracing applications

Key considerations for contact tracing applications

Key considerations for contact tracing applications | 2021-03-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

5 minutes with Alan Duric – Security, privacy and more

5 minutes with Alan Duric – Security, privacy and more

5 minutes with Alan Duric – Security, privacy and more | 2021-01-20 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

5 minutes with Paul Kohler – Security concerns with contact tracing apps

5 minutes with Paul Kohler – Security concerns with contact tracing apps

5 minutes with Paul Kohler – Security concerns with contact tracing apps | 2020-12-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

Five Security Keys for SMBs Going Online

Five Security Keys for SMBs Going Online

Five Security Keys for SMBs Going Online | 2020-11-10 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Three Video Surveillance Tools for SMBs

Three Video Surveillance Tools for SMBs

Three Video Surveillance Tools for SMBs | 2020-11-09 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

California voters approve California Privacy Rights Act (CPRA)

California voters approve California Privacy Rights Act (CPRA)

California voters approve California Privacy Rights Act (CPRA) | 2020-11-05 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

In pursuit of diversity

In pursuit of diversity

In Pursuit of Diversity | 2020-11-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More