article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

Pervasive surveillance capitalism­ -- as practiced by the Internet companies that are already spying on everyone -- ­matters. We need policymakers who understand technology, but we also need cybersecurity technologists who understand -- ­and are involved in -- ­policy. So does society's underlying security needs. One: the supply side.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

Pervasive surveillance capitalism -- ­as practiced by the Internet companies that are already spying on everyone­ -- matters. We need policymakers who understand technology, but we also need cybersecurity technologists who understand­ -- and are involved in -- ­policy. So does society's underlying security needs. One: the supply side.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Top 5 cyber exposures tied to the rising use of international remote workforces

The Last Watchdog

While every business needs to prioritize cybersecurity, doing so is becoming increasingly complicated. With many employees now working remotely, securing company data isn’t as straightforward as it used to be. Here are five unique cybersecurity challenges you should know about. Inconsistent data regulations.

Internet 223
article thumbnail

Congress Passes Bill to Block Sale of Americans' Data to Adversaries

SecureWorld News

The legislation is aimed at preventing hostile countries such as China and Russia from obtaining bulk datasets containing details like Social Security numbers, health information, communications records, geolocation data, and other sensitive personal information on Americans.

article thumbnail

NHS to share UK Patient data with a notorious US Company

CyberSecurity Insiders

News is out that the data will be shared with a notorious US Software firm named Palantir, whose core business is to supply information to companies that are into the business of big data and offering surveillance tech to firms associated with Military, law enforcement, and border forces. .

article thumbnail

Open-Source Intelligence: Using Public Data to Fortify Security

SecureWorld News

As more personal and organizational data ends up online—whether through social media oversharing, high-profile breaches, or surveillance capitalism—the OSINT surface area continues to grow. Follow SecureWorld News for more stories related to cybersecurity. Attendees can earn 1 CPE credit in each educational session.

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

As 2023 draws to an end and cybersecurity budgeting is nearly complete, it helps to consider the year’s events and try to predict next year’s trends. After receiving input from industry experts and doing my own analysis of the year’s driving forces, I identified five major cybersecurity trends. Bottom line: Prepare now based on risk.