The European Union’s General Data Protection Regulation (GDPR) will be enforced in May of this year. We dive into how this wide-ranging regulation affects organizations acting in the public interest. The GDPR recognizes that there must be some leeway given in
The GDPR is fast approaching and it is important to identify the weak links in your enterprise. Where can security be improved? Past experience has shown that third party suppliers are particularly susceptible to attacks.
Users of a lightweight blogging platform maybe have had their database passwords exposed on a public log. This issue brings around DevOps concerns, as well as questions about data protection regulations and compliance.
Fitness tracking app Strava published a heatmap of its fitness app's user activity that could have accidentally revealed the hidden locations of U.S. military bases, patrols, and forward operating bases.
Data is the currency in today’s technology-driven world, and its ever-significant value also drives the extent and increased sophistication of cyberattacks. But how exactly can data be misused to perpetrate cybercrime?