When data collection protects your identity
Personal data isn’t just about your name, it’s also about your online habits. Collecting that data sometimes seems creepy, but it can protect you from fraud, too.
Read more...Personal data isn’t just about your name, it’s also about your online habits. Collecting that data sometimes seems creepy, but it can protect you from fraud, too.
Read more...We’re talking with Paul Smith, country manager for Sweeft Digital, a UK agency helping companies manage their digital presence, including compliance with UK and Europe privacy regulations. He confirmed concerns about the US versions of the GDPR. Bottom line is, each of us has to take care of ourselves. Our governments are not going to.
Read more...Payouts for ransomware are growing faster than the insurance industry can capitalize them. Premiums are rising and as a result coverage limits are dropping. Moreover, Insurance companies are using weak reasons to not pay claims. Here is what you can do.
Read more...Technology companies traditionally ignore the safety downsides of their products. Bluetooth tracking devices can surreptitiously shadow people. But it’s easy to disarm them.
Read more...Finishing up our series on 2022 predictions we went to some of the people we’ve talked to in the past year to get their views on what will influence chip security for the positive in 2022.
Read more...Metropolitan areas in the US have been hit with flash mobs of thieves. Technology already in place could seriously blunt these crimes. The question is whether the shoppers and retailers are ready to take responsibility for using it.
Read more...Last week, the 58th Design Automation Conference (DAC) in San Francisco dropped a few hints that the semiconductor industry will finally consider making chips secure before manufacturing. However, not without kicking, screaming and complaining.
Read more...Establishing consistency in security protocols is a challenge for any organization developing and implementing APIs. Judicious use of automation can mitigate development delays and facilitate development, as panel discussion showed.
Read more...A 17-year-old FBI report claimed that 80 per cent of data breaches originate internally. A recent report on Statista, demonstrates that the problem is much more nuanced.
Read more...Ever heard of Franken-phish? It’s a campaign that targets Microsoft 365 users. It sells kits comprised of components of other kits readily available on the Internet, hence the term “Franken-phish.” Read about it in our latest Scam Bucket Article.
Read more...