Report by the Joint Research Centre (JRC) on?safety, security, privacy and societal questions emerging?from the rise of the Internet of Toys?- “Internet Connected Toys that constitute,?along with the wave of other domestic connected objects, the Internet of Things”.
Report from Citi GPS: Global Perspectives & Solutions on how?consumers are tracked, and how the data that is collected and analyzed, and how consumers feel about that.
Whitepaper on data breaches with?proposals how to decrease response time. It?includes seven security operations capabilities you need, a handy checklist to evaluate your security operations capabilities, and best practices for efficient security response.
paper on mobile-risk scoring and how to do that in practice. It was?carried out by?IAPP and Kryptowire and is based on input of?400 privacy professionals.
UN Special Rapporteur on the Right to Privacy, Joseph Cannataci, presented his report on governmental surveillance and access to personal data from a national and international perspective.
A brief guide on United Nations stand on privacy. Guide is prepared by Privacy International.
Survey on data security and incident response trends, and how to minimise data breach risks.
Annual report of?the Data Protection Commissioner of Ireland for yer 2016.
Discussion paper on Certifications, seals and marks under the GDPR prepared?by?Centre for Information Policy Leadership. It looks at regulation provided in GDPR and benefits of such mechanisms.
The problem now is wide reuse of the same password for different services, as it is much easier for people ?than to remember tens of different passwords. However,?reuse of passwords may lead to bad consequences – hack of one account may allow attacker to accesses also other accounts. Reuse of passwords was reason for recent Dropbox hack.
So this little known company is going to reveal us from passwords hell and bring revolution in authentication.
There are tech companies out there selling spy tools to governments. Those tools let governments to spy on their citizens. Actually, everyone can by spy tools if they can afford them. And there is no check on who’s buying those tools and how they are used.
Privacy?and services in cloud is a hot topic now. With GDPR now adopted some are afraid that new privacy regulation in Europe will kill?the cloud quickly.?Although it is doubtful cloud services will cease to exist because of regulation nevertheless compliance with privacy and data protection regulation will leave an impact.?Therefore it is no surprise two big law firms – Eversheds and Baker & Mckenzie – recently published their reports on cloud services.
Continue reading »
An essay about encryption, regulation, their?past and future.
Encryption policy is becoming a crucial test of the values of liberal democracy in the twenty-first century. The trigger is a dilemma: the power of ciphers protects citizens when they read, bank and shop online ? and the power of ciphers protects foreign spies, terrorists and criminals when they pry, plot and steal. Encryption bears directly on today’s two top threats, militant extremism and computer-network breaches ? yet it enables prosperity and privacy. Should the state limit and regulate the fast-growing use of cryptography? If so, how?
Read full essay here: Cryptopolitik and the Darknet