Search Results for: gdpr

Europe is getting tough on big tech -- when will the US do the same?

In March, the European Union (EU) took a significant step toward reining in Big Tech offenders with the Digital Markets Act. Targeting the gatekeepers of today’s digital economy, the law is a historic piece of legislation and is a critical next step in the broader fight to level the playing field.

However, this watershed moment has failed to reach the US, which continues to fall short in protecting consumers and innovative small businesses from predatory tech companies. Congress must stop playing catch up with Europe and take a leadership role to protect its constituents. Courage and cooperation across the aisle are needed to strengthen the laws that protect the majority. Big tech, their lobbyists, and those seeking to fund their next election are far too cozy as mega-companies continue to exploit their dominance and suppress innovation. The lack of US action is embarrassing, as our friends across the pond take decisive steps. 

Continue reading

The changing role of the CISO [Q&A]

CISO

Digital transformation, a shift to hybrid and remote working, and increasing regulatory pressure have seen major changes to the enterprise IT landscape in recent years.

CISOs have been at the heart of this, facing new challenges and taking on additional responsibilities. We spoke to Ben Smith, field CTO of NetWitness, to discuss these changes and find out what makes a good, or bad, CISO.

Continue reading

SaaS and what it can teach us about human behavior [Q&A]

SaaS

Software-as-a-service has become increasingly popular and the market for it is still growing -- expected to reach $264 billion (£207 billion) by 2026.

SaaS sales are being driven by more companies continuing to digitize their operations in a post-COVID-19 world. We spoke to Paul Quigley, CEO and co-founder of predictive, real-time media monitoring platform NewsWhip, to discover how using SaaS can improve operations for a company, help grow the business, and even offer insights into human behavior.

Continue reading

Get 'Privacy, Regulations, and Cybersecurity' ($27 value) FREE for a limited time

Privacy, Regulations, and Cybersecurity: The Essential Business Guide is your guide to understanding what "privacy" really means in a corporate environment: how privacy is different from cybersecurity, why privacy is essential for your business, and how to build privacy protections into your overall cybersecurity plan.

First, author Chris Moschovitis walks you through our evolving definitions of privacy, from the ancient world all the way to the General Law on Data Protection (GDPR).  He then explains -- in friendly, accessible language -- how to orient your preexisting cybersecurity program toward privacy, and how to make sure your systems are compliant with current regulations.

Continue reading

Android Messages and Dialer apps sent data to Google without consent

Google building logo

In a paper published by Douglas J Leith of Trinity College Dublin, it is claimed that the Messages and Dialer apps found in Android have been sending data back to Google. The paper, entitled "What Data Do The Google Dialer and Messages Apps On Android Send to Google?" says that data is sent without user knowledge or consent.

In what could be a breach of GDPR legislation, it is claimed that there is also no way to opt out of the data sharing. Among the data said to be shared with Google are phone numbers, call duration, hashes of messages and more.

Continue reading

Standard virtual workspace security is improving but still not enough

The COVID-19 pandemic sparked a shift towards work-from-home or telecommuting arrangements, which many companies are saying they are likely to retain even after the pandemic. This new way of working or doing business has raised the demand for collaboration platforms and virtual rooms, which in turn create new cyber security challenges.

One recent flaw is referred to as a cross-site leak or XS-Leak and is linked to Slack's file-sharing feature. If exploited, malicious actors can potentially identify users outside of the workforce messaging platform. It allows cybercriminals to circumvent the web browser security feature called "same-origin policy," which stops browser tabs and frames of different domains from accessing each other’s data.

Continue reading

How to keep customers safe with the correct print security strategy

Today’s Wi-Fi printers possess an array of features that make printing easy, which are especially useful in a world where remote working is commonplace and employees use a range of different devices for producing documents. Despite their advantages, there remain some serious security gaps that hackers can easily exploit if an organization doesn’t have a robust print security strategy in place.

While most businesses do well when it comes to protecting core IT infrastructure including computers, servers and applications, they do often fall short when it comes to secondary assets such as multifunction printers (MFPs). With cybercriminals constantly circling and searching for different ways to infiltrate a company’s network, unsecured connected printers can be a key point of weakness leading to a major breach.

Continue reading

The impact of Brexit on the data center industry

Brexit has had an immeasurable impact on all aspects of UK society, and data centers are no exception. Supply chain continuity has already been damaged, and there is a growing demand for data sovereignty.  

Much of the uncertainty over what Britain’s withdrawal from the EU means for UK data centers still remains, which makes it likely the impact of Brexit will continue to be felt by many in the industry for years to come. Ongoing negotiations and concerns over data relocation leaves open the possibility for new data regulation. This will lead to many data center providers having to take proactive steps to ensure their centers can still transfer data from the EU.

Continue reading

The impact of supply chain data breaches [Q&A]

Digital supply chain breaches are becoming more common, as supply chains increase in complexity so the attack surface grows and even smaller businesses can have complex webs of connections.

But how do supply chain breaches impact businesses? And what can they do to cut the risk? We spoke to Jeremy Hendy, CEO of digital risk protection specialist Skurio, to find out.

Continue reading

Data Privacy Day aims to raise awareness of how we collect and use data

privacy key

Today is Data Privacy Day -- or Data Protection Day, depending on who you talk to -- a day dedicated to an international effort to raise awareness about how data is collected, used and stored.

So, what do the luminaries of the IT world have to say about the day and about data privacy/protection in general? We've rounded up some of their thoughts.

Continue reading

Transparency, regulation and convergence with 5G -- AI predictions for 2022

robot hands crystal ball

Artificial intelligence is making its presence felt in more and more areas of our lives. But what impact is it going to have on digital transformation projects, legislation and more?

Industry experts gave us their views.

Continue reading

Chat Commerce, machine learning and a stronger privacy focus -- eCommerce predictions for 2022

eCommerce

One of the side effects of the pandemic over the last two years has been a boom in online shopping. But is this something that's here to stay? And what are we likely to see happening in the eCommerce field in 2022?

Here is what some of the industry’s experts think will be next year's trends.

Continue reading

Meet the three amigos of data: Governance, privacy and security

The three slices of the data pie -- data governance, data privacy and data security -- are often lumped together -- but although they naturally overlap, there are crucial differences that are important to understand.

Let’s slice up the pie. First, there’s data governance. You can think of it as the cornerstone; the thing that holds everything together. If you have the right data governance in place for all your data assets then it's much easier to apply the right privacy and security controls.

Continue reading

More than a third of consumers don't trust brands with their data

New research from digital experience company Acquia shows that 39 percent of UK consumers don't trust all brands to handle their data correctly.

The study also suggests wide scale breaches of GDPR rules, with a huge 87 percent of UK consumers receiving marketing communications from brands which they don't recall opting in for.

Continue reading

The increasingly critical role of data in the enterprise [Q&A]

Laptop collecting data

The importance of data has increased exponentially in recent years, for businesses of all sizes. But there are increasing challenges too, posed by privacy regulation, alternative data and more.

We spoke to Or Lenchner, CEO of Bright Data to find out more about the key role of data in the enterprise and how businesses can use it effectively.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.