Menu

Blogs

Showing Blog Posts: 1–10 of 111 tagged Privacy

  • Hong Kong Looks to Take a Global Privacy Leadership Role

    by Sam Pfeifle on May 4, 2017

    This fall, at the end of September, the International Conference of Privacy and Data Protection Commissioners will kick off in Hong Kong, bringing the world’s regulators together for the 39th time. It’s no coincidence that Hong Kong will play host. In Privacy Commissioner for Personal Data Stephen Wong, Hong Kong has a motivated and active privacy enforcer looking to be a leader on the global…

  • FCC Privacy Rules Rollback Presents an Opportunity

    by Sam Pfeifle on April 3, 2017

    For those of us in the privacy community, the headlines this week have been a little shrill. “For Sale: Your Privacy Browsing History,” for example. Or perhaps, “How the Republicans Sold Your Privacy to Internet Providers.” That second one is by Tom Wheeler, the democratic Federal Communications Commission Chairman who lost his job when Trump ascended to the presidency. And it’s understandable…

  • Privacy and Cybersecurity in Education: A Constant Battle

    by Ayse Kaya Firat on January 31, 2017

    Millions of institutions across all industries have embraced cloud computing, seeing improvements in productivity, customer service, and cost savings. Yet cloud is impacting one industry at a larger scale than others: Education. Cloud is opening a new world of possibilities to students from across the globe, granting them access to a rich array of training resources, eliminating expensive and…

  • Financial Cybersecurity Regulations Are a Win for Privacy

    by Tom Boyden on January 30, 2017

    Beginning this year, financial and insurance companies in the state of New York will have to comply with some of the country’s most stringent and far-reaching cybersecurity regulations. In September, Governor Andrew Cuomo announced the new rules, which are meant to protect consumers, companies, and our financial infrastructure from the growing threat of cyberattacks. The regulations in their…

  • As Usual, New Technology Means New Privacy Considerations

    by Sam Pfeifle on January 28, 2017

    The financial services industry is certainly no stranger to privacy regulations. In fact, most people point to the Fair Credit Reporting Act as the first real privacy regulation with teeth in the world. So, you’d think people would have sorted out how to comply by now, right? Well, sometimes it’s not so easy. New technological capabilities are changing the way we think about “credit scoring” and…

  • Getting Users Committed to Security: Simple tips to increase user interest and commitment around common threats to their system

    by Jack Danahy on January 26, 2017

    Users are vulnerable to clever malware campaigns and social engineering, making them a common first link in the attack chain. Even in major breaches and ransomware attacks affecting multiple systems or sizable organizations, the entry point is usually created by a single mistake made by some unwitting user. These mistakes are also a meaningful distraction for IT teams, as more than 50% of the…

  • Security and Privacy is Sometimes Suspect, but Growth of the Cloud Marches On

    by Robert Ackerman Jr. on January 12, 2017

    We increasingly hear that the most-discussed computing paradigm, cloud computing – especially the public cloud -- is resuming its sharp rate of growth after a lull and poised to accelerate further. This is refreshing news in a world ever-more obsessed with security, underscoring that cloud purveyors are making progress in getting security right. The attractions of cloud computing are obvious to…

  • The Weaponization of IoT: A Shot Across The Bow – What We Must Do Today

    by Craig Spiezle on December 19, 2016

    IoT devices continue to make headlines for their innovation and as new holiday gifts, with millions of new devices being sold weekly. But with the proliferation of these new devices comes a sobering reality: they are introducing new threats daily. There is real and present danger here, and it will only get worse. While we have experienced devices being compromised and taken over in the past…

  • Creating a Culture of Security and Privacy

    by Todd Inskeep on October 10, 2016

    It seems almost every day we turn on the news and learn of a new data breach or malicious attack on organizations ranging from the entertainment industry to healthcare and finance. The reality is, no organization is completely safe from an attack. And while this may seem grim, there are things organizations can do to help protect themselves. Many see this protection as a product—or stack of…

  • Obfuscation: A User's Guide for Privacy and Protest

    by Ben Rothke on October 6, 2016

    Certain things in life just don't mix. When it comes to personal privacy, using Amazon and Facebook simultaneously is perhaps an example of a potentially dangerous privacy mix. With each site tracking your every search and click, it doesn’t take long until these merchants have a detailed dossier on your on-line habits. That's in addition to profiting of your personal buying habits. This is what…

View All

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Sat, 27 May 2017 04:05:12 -0400.
© 2017 EMC Corporation. All rights reserved.