Showing Blog Posts: 1–10 of 114 tagged Privacy

  • What Do Star Wars’ Kylo Ren and Data Privacy Have in Common?

    by RSAC Editorial Team on January 10, 2018

    *Warning this post or embedded links may contain spoilers* Note: This is part one of a five-part monthly series to kick off 2018 in which we take a look at characters from Star Wars Episode VIII: The Last Jedi and how technology, topics, and trends from the cybersecurity world compare to characters and themes from the blockbuster film. We hope you enjoy our blog series as the Rebellion, …

  • Privacy in Singapore: A Light, If Frequent, Touch

    by Sam Pfeifle on July 12, 2017

    In January, the Personal Data Protection Commission in Singapore will celebrate its fifth anniversary. While any number of privacy regulators have popped up since the PDPC’s establishment – from the Philippines’ to Japan’s to Ghana’s – it’s still easy to think of Singapore as a relatively young governing body. The Personal Data Protection Act didn’t even come into full effect until July 2, 2014. …

  • India’s Evolving Privacy Culture

    by Sam Pfeifle on June 16, 2017

    As a global hub of outsourcing work, companies based in India handle and process personal data from around the world on a regular basis. And there is a robust and growing digital economy in India, with all of the attendant privacy risks. So, why is it that you almost never hear about privacy and data protection issues arising from India? Essentially, it’s because it’s unclear whose job it is to…

  • Hong Kong Looks to Take a Global Privacy Leadership Role

    by Sam Pfeifle on May 4, 2017

    This fall, at the end of September, the International Conference of Privacy and Data Protection Commissioners will kick off in Hong Kong, bringing the world’s regulators together for the 39th time. It’s no coincidence that Hong Kong will play host. In Privacy Commissioner for Personal Data Stephen Wong, Hong Kong has a motivated and active privacy enforcer looking to be a leader on the global…

  • FCC Privacy Rules Rollback Presents an Opportunity

    by Sam Pfeifle on April 3, 2017

    For those of us in the privacy community, the headlines this week have been a little shrill. “For Sale: Your Privacy Browsing History,” for example. Or perhaps, “How the Republicans Sold Your Privacy to Internet Providers.” That second one is by Tom Wheeler, the democratic Federal Communications Commission Chairman who lost his job when Trump ascended to the presidency. And it’s understandable…

  • Privacy and Cybersecurity in Education: A Constant Battle

    by Ayse Kaya Firat on January 31, 2017

    Millions of institutions across all industries have embraced cloud computing, seeing improvements in productivity, customer service, and cost savings. Yet cloud is impacting one industry at a larger scale than others: Education. Cloud is opening a new world of possibilities to students from across the globe, granting them access to a rich array of training resources, eliminating expensive and…

  • Financial Cybersecurity Regulations Are a Win for Privacy

    by Tom Boyden on January 30, 2017

    Beginning this year, financial and insurance companies in the state of New York will have to comply with some of the country’s most stringent and far-reaching cybersecurity regulations. In September, Governor Andrew Cuomo announced the new rules, which are meant to protect consumers, companies, and our financial infrastructure from the growing threat of cyberattacks. The regulations in their…

  • As Usual, New Technology Means New Privacy Considerations

    by Sam Pfeifle on January 28, 2017

    The financial services industry is certainly no stranger to privacy regulations. In fact, most people point to the Fair Credit Reporting Act as the first real privacy regulation with teeth in the world. So, you’d think people would have sorted out how to comply by now, right? Well, sometimes it’s not so easy. New technological capabilities are changing the way we think about “credit scoring” and…

  • Getting Users Committed to Security: Simple tips to increase user interest and commitment around common threats to their system

    by Jack Danahy on January 26, 2017

    Users are vulnerable to clever malware campaigns and social engineering, making them a common first link in the attack chain. Even in major breaches and ransomware attacks affecting multiple systems or sizable organizations, the entry point is usually created by a single mistake made by some unwitting user. These mistakes are also a meaningful distraction for IT teams, as more than 50% of the…

  • Security and Privacy is Sometimes Suspect, but Growth of the Cloud Marches On

    by Robert Ackerman Jr. on January 12, 2017

    We increasingly hear that the most-discussed computing paradigm, cloud computing – especially the public cloud -- is resuming its sharp rate of growth after a lull and poised to accelerate further. This is refreshing news in a world ever-more obsessed with security, underscoring that cloud purveyors are making progress in getting security right. The attractions of cloud computing are obvious to…

View All


Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from on Thu, 18 Jan 2018 03:02:50 -0500.