Top news of the week: 06.05.2020.

Privacy, Strategic management, Rights, Cabinet, Information security, Intelligence agency

Innovations And Trends

On May 1, 2020
@EU_Startups shared
It’s not too late! 5 ways to think about your startup’s GDPR compliance 🤔 From ensuring you're protected, to earning customer trust, to showing investors you're serious, now could be the time to re-visit whether your #startup has a solid GDPR policy 👉 https://t.co/iwrS5Udl6r
Open

It’s not too late! 5 ways to think about your startup’s GDPR compliance

It’s not too late! 5 ways to think about your startup’s GDPR compliance

Startups processing personal data as part of their services are legally bound to comply with the General Data Protection Regulation, or 'GDPR'. Almost two years after the coming into force ...

On May 5, 2020
@LapierreDigital shared
We have protected privacy...the words...from a spy 🧐 https://t.co/pe8XoseLLI
Open

Coronavirus: We have protected privacy, says spy who developed tracing app

Coronavirus: We have protected privacy, says spy who developed tracing app

The government’s new Covid-19 tracing app will preserve people’s “privacy and security”, the GCHQ intelligence service said yesterday.In an unusual move the cybersecurity agency published a ...

On May 4, 2020
@SwissCognitive shared
Featured by me today - Leading global #AI news: Contact Tracing Requires Independent Governance Sign up for the leading weekly AI News! #CognitiveRoundUp: https://t.co/kNX04gnnkr https://t.co/6rO5nCy4BT
Open

Contact Tracing Requires Independent Governance

Contact Tracing Requires Independent Governance

Contact Tracing is the COVID19 rage. Google and Apple have jumped into the fray, collaborating on enabling our smartphones to engage in contact …

On May 5, 2020
@hackernoon shared
https://t.co/k0zK9bjYJ9 🆕HACKER NOON TOP STORY >>What Is “Zoombombing”: an Exaggerated Phenomenon, not a Vulnerability, by Ax Sharma (@Ax_Sharma), Security Researcher, Engineer, Tech Columnist. #StoryOfTheDay https://t.co/JyvKgEZM9U
Open

What Is “Zoombombing”: an Exaggerated Phenomenon, not a Vulnerability

What Is “Zoombombing”: an Exaggerated Phenomenon, not a Vulnerability

Why is the exclusive focus on Zoom, when the same “flaw” impacts almost all popular video conferencing apps?