BigID_ldbd_ROS_GDPR_red
MediaPro_Ldbd_ROS_iapp-executive-summary-ad-cta-1-728x90-opt
OneTrust_Leaderboard_Banner_ROS_728x90_01_19
S17_Banner_300x250-COPY
OneTrust_Square Banner_300x250_DD_ROS_01_19
iapp-privacycore

(Jan 17, 2017) The General Data Protection Regulation is coming in 2018. You know it, I know it, and Torgeir Hovden and Georg Philip Krog know it, too. Hovden and Krog are the co-founders of Signatu, a cloud service aiming to provide a range of solutions to help privacy pros, data protection officers, and lawyers ensure their organization will be in compliance with the GDPR once it comes into effect. “We would like to provide a toolset to enable companies to basically follow all the rules without hiring a lo... Read More

Privacy Tech

Voice assistants, smart gadgets dominate CES 2017

(Jan 6, 2017) The annual Consumer Electronics Show is currently taking place in Las Vegas, as the massive tech event plans to build on its record breaking 177,393 attendees from last year. CES 2017 comes only months before the show’s 50th anniversary, when the first CES was held in New York City in June 1967. Back then, the hot products were pocket radios and TVs with integrated circuits. Needless to say, the technology this year has come a long way from the televisions of 1967. To get the most out of the of... Read More

Privacy Tech

Social engineering still a trouble spot for health IT

(Jan 3, 2017) Health care privacy and cybersecurity are hot topics among industry professionals, and nearly everyone has an opinion on what direction health care will go. One of the most troubling problems health care organizations face is handling and minimizing the amount of spearphishing attacks. While health care organizations can implement strong technological solutions to protect data, the human element involved in spearphishing attacks makes it a more vexing issue for providers to take on. Indiana Un... Read More

Privacy Tech

Building privacy into artificial intelligence and automated systems

(Dec 22, 2016) The pervasiveness of and increasing authority vested in artificial intelligence and autonomous systems has created tremendous anxiety amongst the public. This has led to industry- and academic-based initiatives to address ethics in AI/AS through research and public engagement. The IEEE Global Initiative for Ethical Considerations in the Design of Artificial Intelligence and Autonomous Systems is one such initiative designed to support engineers and serve as a springboard for developing operatio... Read More

Privacy Tech

This new privacy methodology makes data protection more science than art

(Dec 9, 2016) We have worked on data privacy policy and practices issues since the 1980s when virtually all personal information was created from manual paper collection processes and keys punched into mainframe systems. How times have changed! Over the past four decades, we have seen global technological innovation and disruptive business models. But from a privacy perspective, this disruption has outstripped the ability of business owners, government agencies, and IT engineers and developers to confidently... Read More

Privacy Tech

Why business strategy should not drive internet architecture

(Dec 6, 2016) From the film “Jerry Maguire” came those now immortal words: “Show me the money,” and it is within the context of those words that we look at HTTP/2 and HTML5 and its effect on privacy.  [caption id="attachment_198392" align="alignright" width="209"] Image provided by author[/caption] First, let me say that within a business context, I believe that IT architecture should support business strategy. It drives efficiency, enables new products and services, and supports healthy margins. But what a... Read More

Privacy Tech

Technologists call for IoT standards, warn congress of 9/11-sized consequences

(Nov 17, 2016) With the U.S. government undergoing a transfer of power after last week's election, Congress' Committee on Energy and Commerce held a hearing Wednesday exploring cyberattacks and the security of internet-of-things devices. The hearing was called shortly after the attacks on domain name service provider Dyn, an incident that disrupted user access to major internet sites on Oct. 21. Unlike many previous cyber attacks, the attacks on Dyn were promulgated by a slew of unsecure IoT devices such as w... Read More

Privacy Tech

New Wickr CEO looks to build on ephemeral messaging

(Nov 6, 2016) Maybe there’s something to this ephemeral messaging thing. Just as Snapchat reportedly eyes an initial public offering that may bring in as much as $4 billion, another company focused on messages that automatically disappear is also poised to grow: Wickr. A favorite messaging app of dissidents, journalists, and others who want to ensure their messages and audio are both encrypted and set to expire after a specified time (it even showed up in a recent episode of Mr. Robot), Wickr is now looking ... Read More

Privacy Tech

Health care privacy pros say industry's on the right track, but issues remain

(Oct 28, 2016) The Institute for Critical Infrastructure Technology recently released a report detailing stolen electronic health records and how the data is sold on the deep web. The report was critical of the health care industry’s attitude toward cybersecurity, stating “the health care sector trivialized threats and ignored cybersecurity for too long.” That begs the question: Are health care’s cybersecurity efforts as uninspired as they seem? To find out more, Privacy Tech chatted with four health care pri... Read More

Privacy Tech

Why medical breaches run rampant and what can be done to stop them

(Oct 13, 2016) While the deep web isn't all bad, there are plenty of shady areas where it earns a bad reputation.  Researchers at the Institute for Critical Infrastructure Technology discovered that firsthand. While compiling research for a new study, they stumbled upon marketplaces where users can buy prescription drugs, access government and pharmacy databases, and buy medical information from stolen electronic health records. The study – Your Life, Repackaged and Resold: The Deep Web Exploitation of Healt... Read More

Privacy Tech