Cybersecurity

Cybersecurity Data Privacy News

Get the latest headlines about data protection, including data privacy laws & more. These issues are symptoms of a profound shift in the world of data privacy & security that have major implications for organizations. With the rise of big data & machine learning, privacy & security are now converging.

Top news of the week: 21.05.2022.

#CyberSecurity
#DataProtection
#MicrosoftPurview
#government
#RSAC
#MicrosoftSecurity
#data
#legislation

Data Privacy

@msftsecurity shared
On May 19, 2022
As a CISO, protecting sensitive business data is a key priority. Here are three considerations for reducing risk of internal and externa data breaches, from our @alymrayani: https://t.co/0hT989XB3T #DataProtection #MicrosoftPurview
Open
So you want to be a CISO: What you should know about data protection

So you want to be a CISO: What you should know about data protection

Learn how insider threats, data siloes, and shifting responsibilities are all affecting data management—and how security professionals can diminish risks to the organization.

@Dejan_Kosutic shared
On May 19, 2022
*5 Things to know about the UK’s National #CyberSecurity Centre (NCSC)* The NCSC is the public front end for GCHQ and provides a single point of contact for SMEs, larger organisations, government agencies, the general public and #government departments https://t.co/9drCEjIwEd
Open
5 Things to know about the UK’s National Cyber Security Centre (NCSC)

5 Things to know about the UK’s National Cyber Security Centre (NCSC)

The NCSC provides a single point of contact for organisations of all sizes, government agencies and departments, and the general public.

@msftsecurity shared
On May 16, 2022
Join Microsoft at #RSAC on June 6–9, 2022. Explore how Microsoft Security provides end-to-end protection—the most comprehensive approach to security that helps you be fearless. Read our blog 🔗: https://t.co/LjPthjpoXF #MicrosoftSecurity
Open
Microsoft showcases the future of comprehensive security at RSA 2022

Microsoft showcases the future of comprehensive security at RSA 2022

RSA 2022 is happening in person—find out about Microsoft-sponsored sessions, pre-day events, speakers, awards, and more.

@ProfWoodward shared
On May 16, 2022
Turning your iPhone off doesn’t just mean it’s still findable - it’s an attack vector that survives your phone sleeping https://t.co/kUSKG0k3CM
Open
Evil Never Sleeps:  When Wireless Malware Stays On After Turning Off iPhones

Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones

Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones Jiska Classen Secure Mobile Networking Lab, TU Darmstadt Germany [email protected] Alexander Heinrich …

@BrianHonan shared
On May 15, 2022
RT @PrivacyPros: "Research finds women's health apps are unsecure, fail to meet EU GDPR standards" (via @DailyDashboard) https://t.co/rsF1pqvjC7
Open
Research finds women's health apps are unsecure, fail to meet EU GDPR standards

Research finds women's health apps are unsecure, fail to meet EU GDPR standards

A group of researchers have published a research paper in the Journal of Internet Medical Research that examined the privacy protections of women’s health apps.

@Dejan_Kosutic shared
On May 16, 2022
*UK Announces Data Reform Bill* The Bill will focus on a flexible, outcomes-focused approach rather than box-ticking, and will simplify the rules relating to the use of personal data for research purposes #data #legislation https://t.co/uqt6rB1No5
Open
UK Announces Data Reform Bill

UK Announces Data Reform Bill

On May 10, 2022, as part of the Queen’s Speech, the UK government announced its intention to introduce a Data Reform Bill.

@Infosec_Tourist shared
On May 19, 2022
RT @TechNative: #Cybersecurity, resilience and incident recovery isn’t an IT problem - it’s a business imperative https://t.co/vFp4E2czHY
Open
Going on the attack: Top five consequences of cyber security breaches

Going on the attack: Top five consequences of cyber security breaches

Last year, we saw a marked upturn in the volume, creativity, and audacity of cyber-attacks across the globe, targeting businesses, governments and in some cases, the critical infrastructure ...