iOS app Android app

Data Protection

The Digital Underworld: What You Need to Know

Doug Irving | Posted 07.26.2016 | Technology
Doug Irving

Illustration by Meriel Waissman Tens of millions of Americans will have their credit-card numbers, hospital records, or digital identities hacked or ...

Europe's DIgital Revolution

Deo Delaney | Posted 07.22.2016 | Technology
Deo Delaney

The General Data Protection Regulation (GDPR) marks the beginning of a new era in Europe. With the new legislation intended not only to strengthen EU citizens' rights but also to simplify rules for businesses in EU Member States, every EU citizen is a vital stakeholder in the process.

Making a Digital Difference in the Classroom With Data

Jules Polonetsky | Posted 04.14.2016 | Education
Jules Polonetsky

From K-12 through higher-ed, more tools and platforms are now churning out more highly detailed data than ever. Because of this new data, research is a more valuable and desirable tool than ever.

Getting to "Reasonable" With the SAFETY Act

Brian E. Finch | Posted 02.23.2017 | Business
Brian E. Finch

While an executive or board member has every right to ask about a company's cybersecurity posture, the problem is that CIOs generally do not have the ...

Progress in Building Trust in Trans-Atlantic Data Flows

Victoria Espinel | Posted 02.11.2017 | Technology
Victoria Espinel

Last night, the U.S. House passed the Senate-amended version of the Judicial Redress Act, now headed to President Obama for signature. Progress on this front matters.

What Is the "Cloud" and How Can it Help My Business?

Jason Volmut | Posted 10.28.2016 | Chicago
Jason Volmut

Essentially, a cloud setup has two requirements: a group of connected servers, and virtualization software that connects those servers. The virtualization software is the key piece that turns a regular group of computers into a cloud computing setup.

Meet The Man Who Took Facebook To Court In Europe And Won Big

Reuters | Alexandra Ma | Posted 10.07.2015 | Technology

BRUSSELS/FRANKFURT, Oct 7 (Reuters) - From Vienna cafes to the European Union's highest court, an Austrian law student's two-year battle against Faceb...

Protect Your Data, Maintain Your Sanity

Steven Shehori | Posted 09.29.2016 | Technology
Steven Shehori

In many ways, data loss -- especially the extreme cases -- is the modern-day equivalent of a house fire. Except here's the distinction: without the stark image of a charred, demolished structure, the empathy you'll receive from others will be at best subdued and at worst non-existent.

How the Ashley Madison Hack Might Impact You

NextAdvisor.com | Posted 08.28.2016 | Technology
NextAdvisor.com

Whether you are a part of the database or not, this hack could affect you. Millions of e-mail addresses, home addresses, credit cards and other information are contained within the leaked database.

Why Does Europe Hate Silicon Valley?

Mark Weinstein | Posted 06.23.2016 | Technology
Mark Weinstein

American ingenuity is alive and well. We've changed the rules of the game, invented new playing fields, and blazed new paths. Europeans would admit this reality as much as we do ourselves. The divide therefore comes when Europe thinks these services don't protect the individual.

Bridging Policy Silos in Digital Field

Dr. Jovan Kurbalija | Posted 06.09.2016 | Home
Dr. Jovan Kurbalija

The omnipresence of the Internet in modern society makes most digital policy issues transversal. Yet, a transversal approach is more an exception than a rule in digital policy, on both national and international level.

National Cybersecurity: We Need a Fortress, Not a Sandcastle

Bill Solms | Posted 06.08.2016 | Technology
Bill Solms

The hack that resulted in the theft of information on 4 million government employees didn't need to happen. We had plenty of warning and next to nothing was done.

Hello Facebook, Goodbye Privacy: FB's Rogue "Hello Android" app

Mark Weinstein | Posted 06.29.2015 | Technology
Mark Weinstein

Smartphones these days tend to be more about the "smart" and less about the phone. With all the cool apps and features we can use on our devices, the ...

Is BYOD Worth the Security Risk for Your Startup?

Adam Greenwald | Posted 04.04.2015 | Small Business
Adam Greenwald

It's important to understand that your startup already faces some security risks, even if it doesn't have a BYOD program. About half of employees in the U.S. admit to storing work-related information on their personal devices whether their employees have BYOD programs or not.

7 Ways Data Currently Being Collected About You Could Hurt Your Career or Personal Life

Frank Pasquale | Posted 01.06.2015 | Home
Frank Pasquale

Databases may be defaming you without you even knowing it.

For Sale: My Data

Ishani Banerji, Ph.D. | Posted 11.23.2014 | Business
Ishani Banerji, Ph.D.

Would I be willing to sell my online social media activity? What about my location? What about my financial information? These questions led to further questions.

Please Protect Me From My Password

Tarun Sakhrani | Posted 11.21.2014 | Technology
Tarun Sakhrani

In today's day and age, with technology at our fingertips (quite literally) there has been a bit of an invasion of our personal space and our privacy. Some of it is by our choosing, some of it not so much.

Hackers Bypass Home Depot Debit Card PINs

CreditSesame.com | Posted 11.11.2014 | Business
CreditSesame.com

Home Depot hasn't really told us much about their data breach so far, and for that, I say shame on them. One of the few things they did share though, and quite categorically, is that no debit card PINs were exposed in the breach.

Home Depot's Hack Response in Three Little Words

CreditSesame.com | Posted 11.04.2014 | Business
CreditSesame.com

If the Home Depot breach turns out to be as bad or worse than the Target breach, certain things will be unavoidable for the home improvement giant. But there are some things the company can do to help reduce the short and long term impact and cost.

The Big Lie Behind the Biggest Data Breaches

CreditSesame.com | Posted 11.02.2014 | Business
CreditSesame.com

Enough with the data breach excuses already. Not only are they as jaded as the breaches themselves, they're often just not true. In the aftermath of almost every data breach, chances are you're only going to get a boilerplate public statement.

The Hidden Dangers in Your Kid's Backpack

Adam Levin | Posted 10.07.2014 | Technology
Adam Levin

The things your child carries in his or her rucksack can become weapons of your financial destruction if they fall into the wrong hands.

The Dog Days of Summer and 99 Days of Facebook Freedom - Woohoo!

Mark Weinstein | Posted 09.22.2014 | Technology
Mark Weinstein

At the end of the day we are not customers to Facebook rather we are products that offer cash potential to advertisers (their true customers) based on every online move we make. Facebook knows it. We know it. Zuckasaurus knows it.

Apricorn and Toshiba Help Keep Data Safe

Michael L. Berman | Posted 09.06.2014 | Technology
Michael L. Berman

How secure is your data? Can anyone log onto your computer and access files on your hard drives or flash drives? Unless you've been diligent about encrypting and password protecting those files, the answer is probably "I don't know."

Facebook, It's Time We Talk Divorce

Mark Weinstein | Posted 09.04.2014 | Technology
Mark Weinstein

Facebook is doing everything it can to rebuild another you, faster, stronger, more perfect, and more capable of maximizing the profit it hopes to extract with advertisers. Sound farfetched? Not when you throw in the opening an English investigation as to whether Facebook violated data protection laws with its actions.

Anyone Can Find Your Personal Info Online, Right Now

Russ Warner | Posted 07.15.2014 | Technology
Russ Warner

Your personal information is constantly bought, tracked, and sold. There is no way to deny the use and sale of personal data. To prevent future incidents, use extra caution when sharing personal information.