article thumbnail

Texas to sue Meta for data privacy violation over Facial Recognition

CyberSecurity Insiders

Keeping aside the images related to the FB users from other states, the Texas Attorney General’s Office in Marshall district of Texas is only interested in asking FB to delete all such photos uploaded onto its platform by users living in the said state, as it violates the Texas data privacy rules.

article thumbnail

Data Privacy threat to Americans from Biden government

CyberSecurity Insiders

As per the report on CNN, this public surveillance program will be carried out by Department of Homeland Security and will be done by collaborating with private companies, mainly those belonging to technology sector. Both the stories were later proved to be true, making Snowden and Assange take asylum in Russia till 2019.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Consumer Data Privacy Rights: Emerging Tech Blurs Lines

Threatpost

Data privacy is a fundamental right for Americans - but new emerging technologies like drone, IoT and facial recognition are introducing gray areas.

article thumbnail

Waiting for Federal Data Privacy Reform? Don’t Hold Your Breath.

The Security Ledger

Despite a litany of high-profile data breaches, federal action on data privacy is unlikely to go anywhere in 2019 as partisanship and lack of technology literacy complicate Congressional action. The post Waiting for Federal Data Privacy Reform? Don’t Hold Your Breath.

article thumbnail

5 IoT Security Predictions for 2019

Security Affairs

2018 was the year of the Internet of Things (IoT), massive attacks and various botnets hit smart devices, These are 5 IoT Security Predictions for 2019. 2019 will continue these trends but at a faster pace. Upcoming government standardization efforts will continue to increase substantially in 2019. About the author: Matt Burke.

IoT 88
article thumbnail

7 Habits of a Highly Effective CISO: 2019 Data Security Resolutions

Thales Cloud Protection & Licensing

It’s 2019 and data is everywhere – and what you can do with what is at your fingertips is truly transformative. Unlike traditional databases, Big Data is unstructured and any sensitive data can go into a data lake (which holds data in its raw format) and then show up later in a report.

CISO 72
article thumbnail

GUEST ESSAY: Securely managing access controls is vital to preserving the privacy of healthcare data

The Last Watchdog

However, M&A is a complex undertaking, and integrating and consolidating IT, cybersecurity and data privacy infrastructure only adds to the challenge. M&A invariably creates technology gaps that bad actor’s prey upon. Patient data exposures. Zero trust is an all-inclusive security and privacy architecture.