article thumbnail

How New U.S. Legislation Changes Global Digital Sovereignty as We Know It

Thales Cloud Protection & Licensing

Before we dive in, we have an upcoming webinar where our VP of Workforce IAM, Guido Gerrits, goes even deeper on the topic with more insights and expert recommendations for traversing this complex set of circumstances. What is digital sovereignty? Why, you ask? Lets break down what these White House-driven adjustments could mean for you.

article thumbnail

Privacy issues in smart cities – Lessons learned from the Waterfront Toronto – Sidewalks project

Privacy and Cybersecurity Law

Risk #1: Surveillance both from the State and surveillance capitalism. Capitalist surveillance particularly arose around the Quayside project because of the link to Alphabet and Google. Digital solutions generally create the risk of law enforcement access to the data they collect. Risk # 5: Data Monetization. Share on Facebook.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Administrator’s Guide, Part 2: Passwords Are Safer Than Biometrics, PINs Are Just Passwords, and Other Tall Tales

Duo's Security Blog

That is, while biometrics can be used for authentication , they can also be used for surveillance. For instance, biometrics used at border crossings, despite being used to identify users, are checked against a central database rather than a device you carry locally with you, and so fall under the surveillance category.

article thumbnail

PRIVACY ISSUES IN SMART CITIES – LESSSONS LEARNED FROM THE WATERFRONT TORONTO – SIDEWALKS PROJECT

Privacy and Cybersecurity Law

Risk #1: Surveillance both from the State and surveillance capitalism. Capitalist surveillance particularly arose around the Quayside project because of the link to Alphabet and Google. Digital solutions generally create the risk of law enforcement access to the data they collect. Risk # 5: Data Monetization. Share on Facebook.

article thumbnail

What Is Missing from Cybersecurity Industry Research?

SecureWorld News

But is something missing from these industry reports, webinars, and white papers? The information revolution does not portend a new anarchy rife with destructive disruption but rather the encroaching hierarchy of the surveillance state. Something that could distort your vision of cyber reality and perhaps harm democracy, itself?

article thumbnail

What’s an IT Budget and How Much Should I Spend on Cybersecurity?

Approachable Cyber Threats

Building security and fobs; Video surveillance equipment; Conference room systems (e.g., If you’re looking to read more tips, tricks, and cybersecurity information, subscribe to our ACT newsletter or check out our latest recorded webinars (all for free!). cameras, speaker phones, etc.); Let's Talk.

article thumbnail

Eight tips for dealing with international data transfers without Privacy Shield

BH Consulting

The blog series will be followed by a free webinar with our data protection experts. Following this, the privacy campaigner Max Schrems complained to the Data Protection Commission (DPC) that Facebook was helping the NSA conduct mass surveillance of EU citizens. To register please follow this link. The DPC rejected his complaint.