In this guide: Core tenets of Switzerland’s New Federal Act on Data Protection (nFADP) The Swiss government created the new Federal Act on Data Protection (nFADP) to update their existing… Continue reading Guide to Switzerland’s New Federal Act on Data Protection (nFADP)
role: CISO & CIO
Calculating the ROI into External Data Privacy Management Solutions
External data privacy management is a preventative activity focused on preempting data breaches and other damaging consequences of unsecured external data. For preventative solutions – those that don’t yield a… Continue reading Calculating the ROI into External Data Privacy Management Solutions
Guide to Thailand’s Personal Data Protection Act (PDPA)
In this guide: Overview of Thailand’s Personal Data Protection Act (PDPA) Following an initial postponement, Thailand’s Personal Data Protection Act (PDPA) entered into force in 2022 as the country’s first… Continue reading Guide to Thailand’s Personal Data Protection Act (PDPA)
Guide to South Africa’s Protection of Personal Information Act (POPIA)
In this guide: Key provisions of South Africa’s Protection of Personal Information Act The Protection of Personal Information Act (POPIA or “POPI Act”) is South Africa’s premier data protection law… Continue reading Guide to South Africa’s Protection of Personal Information Act (POPIA)
AI Powered Spear Phishing – Why Fighting Fire With Fire Fails
As if perpetrating cybercrimes – particularly spear phishing – weren’t easy enough for any aspiring hacker or established organized crime ring, it has just become even easier for bad actors… Continue reading AI Powered Spear Phishing – Why Fighting Fire With Fire Fails
Uber’s 2022/23 Data Breaches – A Postmortem Through the Prism of External Data Privacy Management
This postmortem document examines one of the more high-profile cybersecurity breaches of the last several years – the series of data breaches perpetrated against popular ride-sharing application and service, Uber. … Continue reading Uber’s 2022/23 Data Breaches – A Postmortem Through the Prism of External Data Privacy Management
Solar Winds Attack – A Postmortem Through The Prism Of External Data Privacy Management
This postmortem document examines one of the most significant cybersecurity breaches of the 21st century – the SolarWinds Cyberattack – and deconstructs the vulnerabilities and failures enabling its success. Part… Continue reading Solar Winds Attack – A Postmortem Through The Prism Of External Data Privacy Management
How any Organization Looks in the Eyes of a Hacker – How to Avoid Being Seen as a Target
Scammers, particularly cyber thieves, make their living by finding the easiest ways to separate marks from their money. That is, this type of criminal doesn’t want to work too hard. … Continue reading How any Organization Looks in the Eyes of a Hacker – How to Avoid Being Seen as a Target
Converting Cookie Consent from an Expense to a Profit Center
There is growing awareness and alarm among consumers surrounding data privacy threats facing individuals and organizations. For individuals, instances of identity theft, phishing scams and the whole host of other… Continue reading Converting Cookie Consent from an Expense to a Profit Center
Your Privacy Risk Score: What Is It and How is it Calculated?
What is your organization’s privacy risk score? Do you know? How about the privacy risk scores of each employee and vendor/partner associated with your organization? Do you have that information… Continue reading Your Privacy Risk Score: What Is It and How is it Calculated?