The patchwork data privacy regulations are amplifying the challenges for IT and security professionals around the globe.
Data privacy defines who has access to an individual’s personal data, and allows individuals to control how Personally Identifiable Information (PII) is collected, stored, and used.
Data privacy has become front and center of the privacy vs security debate when it comes to the internet. The general lack of regulation around in previous years fostered widespread corporate abuse of end user data to drive greater profits. The backlash to abuse led to greater protections for individuals which limits how organizations may collect, store, and use any Personally Identifiable Information (PII).
The European Union (EU) was the first to act on with the General Data Protection Regulation (GDPR) in May of 2018. The state of California followed suit in June 2018 with its own version – the California Consumer Privacy Act (CCPA). And these regulations continue to expand across the globe to support greater protections for individuals with regards to keeping their personal data private.
The Digital Services Act sets the stage for a new era of digital regulation in the EU by making what is illegal offline, illegal online.
The Strengthening American Cybersecurity Act is necessary to protect the Nation’s critical infrastructure. But is it enough?
EU regulatory agencies forge ahead with new proposals to evolve legislative frameworks for governing the online space with a focus on safety.
Rife with vulnerabilities that are actively probed by MCAs, connected consumer-grade equipment is poised to be the next attack surface.
Today’s world of hyperconnectivity positions privacy vs security as one of the most fiercely contested global debates. Can you have both without compromise?
We’re only just beginning to understand how mass data surveillance systems and data privacy impacts us. Will GDPR-like regulation come to the U.S. in 2019? It will require time to craft legislation, achieve some level of adoption, and put it up for a vote—but what’s next?
I was recently debugging a nasty issue in one of our backend services and needed to view the exact HTTP request & response being sent to an authentication server. Fortunately, Go’s standard library provides http.RoundTripper, httputil.DumpRequestOut & httputil.DumpResponse, which are great for dumping the exact out-bound request & the response. But since an authentication request contains credentials and a response contains a security token, it would have been insecure to record credentials & tokens in our logging systems. How could I securely exfiltrate the information I needed, while maintaining security and not requiring a whole lot of changes to my codebase or deployment environment?
The Journey of Building a Next-generation SOA Data Services Platform. Several years ago, zvelo systems and cloud infrastructure was completely overhauled—leveraging machine learning and cloud computing to improve web content categorization, our URL database, and other systems. This is story.
EU Commission and United States agree on new framework for transatlantic data flows A new US/EU arrangement puts stronger regulations on companies in the U.S. to protect the personal data of Europeans and stronger monitoring and enforcement by the U.S. A few highlights that new arrangement will include: Strong obligations on companies handling Europeans’ personal…