Prepare for Compliance: China’s Data Security Law contains provisions that cover the usage, collection, and protection of data in China. Violations will trigger penalty fines and even suspension of business and revocation of license or permits.
Every six months, we compile a list of the worst data breaches that occurred during that period in order to learn from them. So far this year, the causes of the worst data breaches have shifted from human error and credential based attacks that we saw at the end of last year to ransomware, third-party vulnerabilities, and undetected security gaps.
Apple has begun testing passkeys, a new authentication technology it says are as easy to use as passwords but vastly more secure.
The article discusses the technical requirements needed to protect our personal data and to ensure a safer digital world. It presents solutions for creating an open and secure IT infrastructure where data privacy can always be guaranteed.
Bruce Schneier about efficiency and inefficiency in times of Covid-19.
Communities across the United States are starting to ban facial recognition technologies. In all cases, modern mass surveillance has three broad components: identification, correlation and discrimination. Read more on Bruce Schneier’s blog on Security.
Hold verifiable elections with one or more polls. Several different ballot types and election systems are supported, such as simple questions with predefined answers, party lists, score voting, or single transferable vote.