According to a recent press release, “Cisco today issued a call to governments and citizens around the world to establish privacy as a fundamental human right in the digital economy. Today, connectivity and technology have become the foundation for peoples’ economic, social, and cultural opportunities. With IoT, 5G, and AI promising to soon reshape how […]
Killing Anonymity: The Question of Data Privacy
Click to learn more about author Cathy Nolan. Maybe we should ask, “who or what killed anonymity?” The question being debated over and over again is “have we given away our privacy for convenience and security?” It would appear that the answer is “yes”. Some of our privacy we give away without even knowing it, but […]
Data Security and Protection of Emails
Click here to learn more about author Cathy Nolan. No one can deny that email and email hacking was at the center of our recent Presidential election. If nothing else, the American public learned that putting personal information in emails is not much safer than posting it on one of the numerous social media sites. […]
Cyber Civil Rights: How Data Analytics Can Shape Civil Rights Litigation at the NAACP
Click here to learn more about author Kwame Gyamfi. Taking on the position of Chairperson for the Information Technology Committee of the National Association for the Advancement of Colored People (NAACP) chapter in my local district opened up a challenge for me to see how and where my skill sets fit within the oldest civil rights […]
Prifender AI Maps Personal Info of Corp Networks
Per PRWeb, Prifender’s solution changes the status quo of privacy management. The privacy industry relies today on paper-based solutions such as contracts, confidentiality agreements, training, and policies. There are several software solutions that address the need to document actions and demonstrate compliance, but there are no technical solutions that allow an organization to do so automatically. […]
Data Security: Can My Car Be Hacked?
Click here to learn more about author Cathy Nolan. Of course it can. Anything that uses a computer to operate it or any of its systems can be hacked, but the potential for harm has been largely swept under the rug by car manufacturers. The fact that criminals can either remotely or directly take control […]
Data Privacy: Why Can’t We Be “Friends”?
Click to learn more about author Cathy Nolan. Do you have Facebook Friends on your personal account that you barely know or who are friends of friends? Maybe it’s time to do some un-friending and review your privacy settings. While some people think they are in a competition to see how many Facebook “friends” they […]
Can Big Data and Privacy Coexist?
by Angela Guess Michael Kassner recently wrote in TechRepublic, “User privacy concerns date back at least 200 years. In the 1800s, newspapers were more than a little invasive in their quest for news. In the early 1900s, wiretapping came into play with the invention of the telephone recorder. Both examples pale in comparison to what […]
4 Enterprise Data Security Protocols to Safeguard Your Personal Data
Click here to learn more about author David Schlesinger. Why Is ‘Phil’ Downloading the HR Database at 4:00 A.M.? Perhaps huge downloads of data from sensitive data structures are seen to be problematic and worrisome for your enterprise. The Product Price List is one thing, the HR database is quite another. Downloads from sensitive systems […]
All Your Data Belongs To Us – Data Security in a Global Infrastructure
Click to learn more about David Schlesinger. A database management system (DBMS) is the embodiment in code of a logical process to store, move, analyze, select and output information. Within the code blocks that make up the DBMS program there is provision to limit a user’s rights regarding creating, reading, modifying or deleting data entries. […]