La relación cercana que existe entre la temática de privacidad y la ciberseguridad en un mundo completamente globalizado y digitalizado es compleja. Por lo tanto, este artículo incluye algunos consejos y recomendaciones para su manejo, así como disparadores para futuros debates que enriquezcan ambos mundos.
Nota completa
shareShare This
Related Stories
UN agency suffers ransomware attack
A significant amount of U.N. Development Programme data related to its staff and internal operations was stolen in a ransomware attack, CyberScoop reports. While the agency did not detail what types of data was stolen, hackers reportedly were able to "access a number of servers" that contained "a la...
The IAPP's top 5 most-read articles for the week of 15 April 2024
We know there's a lot of news to sift through these days. To help, we have gathered the top headlines of the week for you.
EDPB opinion on legality of pay-or-consent models in EU GDPR context
A window into proposed APRA from lead US Senate drafter
US House subcommittee kicks off draft American ...
South Africa approves data management directive
South Africa's Department of Public Service and Administration Minister Noxolo Kiviet approved a directive on data management. The directive is a "legal instrument to give effect to the mainstreaming of knowledge management and data management in the public service." It aims to increase the developm...
Ransomware group sells medical, financial records from data breach
Ransomware group RansomHub claimed it is selling U.S. citizen's medical and financial records following a cyberattack on Change Healthcare, Wired reports. Emsisoft Threat Analyst Brett Callow said it is likely an attempt to collect additional ransom payments from the health care companies involved i...
FTC advises on data security vulnerabilities
The U.S. Federal Trade Commission's Office of Technology wrote about how to strengthen data security systems to avoid punishable data breaches. The advisory discusses vulnerabilities that include cross-site scripting, structured query language injections and buffer overflows.Full story...
Comments
If you want to comment on this post, you need to login.