#data-security

[ follow ]
Data science
fromFast Company
1 hour ago

Stop letting ChatGPT and other AI chatbots train on your data. Here's why-and how

Chatbot interactions often expose personal data used for AI training, risking privacy, but users can opt out of data usage.
Apple
fromWIRED
2 days ago

Your Phone Notifications Reveal More Than You Realize. Here's How to Lock Them Down

FBI accessed deleted Signal messages through iOS notification logs, raising privacy concerns despite Apple's update to improve data security.
fromTechzine Global
3 days ago

Stolen patient data from Dutch firm ChipSoft destroyed after cyberattack

ChipSoft confirmed that all data stolen in the ransomware attack has been destroyed in a technically sound manner, although the specifics of this process remain undisclosed.
Privacy professionals
Mobile UX
fromGSMArena.com
3 days ago

WhatsApp could let you back up your chats on its own encrypted cloud storage

WhatsApp is developing its own encrypted cloud storage for chat backups, offering users additional options beyond Google Drive and iCloud.
European startups
fromTechRepublic
4 days ago

EU Funds Sovereign Cloud Infrastructure with 180 Million Contract

The European Commission awarded a €180 million contract to four providers for sovereign cloud services to ensure EU digital sovereignty.
#chatgpt
fromZDNET
6 days ago
Privacy professionals

How to audit what ChatGPT knows about you - and reclaim your data privacy

fromwww.bbc.com
1 week ago

Biobank data incident caused by 'a few bad apples', boss says

"In this case, a few bad apples have taken those data off the platform and they have listed the data for sale," Sir Rory told the BBC Radio 4's Today programme.
Privacy professionals
#age-verification
Privacy technologies
fromTheregister
1 week ago

Proton CEO: Age checks turn internet into ID checkpoint

Age verification risks transforming the internet into a system requiring identification for all users, compromising anonymity and security.
fromGameSpot
2 months ago
Privacy technologies

Over 90% Of Discord Users Will Not Need To Verify Their Age, CTO Says

Discord delays global age verification to late 2026, clarifying that 90% of users won't need authentication unless accessing age-restricted content and cannot be verified as adults.
Privacy technologies
fromTheregister
1 week ago

Proton CEO: Age checks turn internet into ID checkpoint

Age verification risks transforming the internet into a system requiring identification for all users, compromising anonymity and security.
Privacy technologies
fromFlipboard
1 month ago

How Child Safety Laws Are Changing the Internet

Age verification systems on social media platforms risk exposing users' sensitive personal data to hackers through third-party vendors handling ID and facial recognition checks.
#digital-sovereignty
European startups
fromZDNET
1 week ago

98% of IT leaders want digital sovereignty: Now SUSE is operationalizing it for companies everywhere

SUSE is focusing on digital sovereignty to enhance choice and resilience in enterprise IT globally.
fromEngadget
3 months ago
France news

The French government is ditching Zoom and Microsoft Teams for a home-grown alternative

European startups
fromZDNET
1 week ago

98% of IT leaders want digital sovereignty: Now SUSE is operationalizing it for companies everywhere

SUSE is focusing on digital sovereignty to enhance choice and resilience in enterprise IT globally.
fromEngadget
3 months ago
France news

The French government is ditching Zoom and Microsoft Teams for a home-grown alternative

fromwww.bbc.com
1 week ago

UK Biobank health data listed for sale in China, government confirms

We understand that the existence of these listings, even temporarily, will be concerning to you. We want to reassure you that all the data are de-identified; they do not contain any personally identifying information (such as names, addresses, dates of birth, and NHS numbers).
EU data protection
Marketing tech
fromThedrum
1 week ago

The GumGum Platform Achieves Global SOC 2 Compliance, Setting Standards for Data Security

GumGum achieved SOC 2 compliance, enhancing data security and system reliability for partners and customers globally.
EU data protection
fromTechzine Global
1 week ago

Kyndryl acquisition likely to cost Solvinity key Dutch contract

The Dutch House of Representatives urges the government not to renew the DigiD contract with Solvinity if it is acquired by Kyndryl.
#tiktok
fromPR Daily
1 week ago
Social media marketing

Social media updates and new features to know this week - PR Daily

TikTok has received a security certification for its U.S. data protection systems, while also upgrading its ad creation tools with AI features.
fromwww.socialmediatoday.com
1 week ago
Information security

TikTok's US joint venture gains security infrastructure certification

TikTok USDS Joint Venture has achieved ISO/IEC 27001:2022 certification, enhancing user trust in its data security measures.
Social media marketing
fromPR Daily
1 week ago

Social media updates and new features to know this week - PR Daily

TikTok has received a security certification for its U.S. data protection systems, while also upgrading its ad creation tools with AI features.
#privacy
Privacy technologies
fromComputerWeekly.com
2 weeks ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Startup companies
fromTechRepublic
2 weeks ago

NTT Research Launches Scale Academy to Bring Lab Technology to Market

NTT Research transitions from pure research to product development with the launch of Scale Academy, aiming to commercialize innovations and meet market demands.
Privacy professionals
fromEngadget
2 weeks ago

Anthropic will ask Claude users to verify their identities 'for a few use cases'

Anthropic is implementing identity verification for certain capabilities on Claude, requiring users to provide a government-issued ID and a selfie.
#palantir
Privacy professionals
fromwww.bbc.com
2 weeks ago

Palantir defends its record as MPs demand more scrutiny of data use

Palantir defends its NHS data contracts amid scrutiny, emphasizing its role in integrating fragmented healthcare systems and ensuring data security.
UK politics
fromwww.theguardian.com
1 month ago

MP rejects Palantir's claims that criticism of NHS England deal is ideologically motivated'

Concerns over Palantir's NHS contract focus on transparency, data security, and value for money, not just ideological motivations.
Privacy professionals
fromwww.bbc.com
2 weeks ago

Palantir defends its record as MPs demand more scrutiny of data use

Palantir defends its NHS data contracts amid scrutiny, emphasizing its role in integrating fragmented healthcare systems and ensuring data security.
UK politics
fromwww.theguardian.com
1 month ago

MP rejects Palantir's claims that criticism of NHS England deal is ideologically motivated'

Concerns over Palantir's NHS contract focus on transparency, data security, and value for money, not just ideological motivations.
Software development
fromMedium
2 weeks ago

GAIA by AMD - Running Intelligent Systems Fully on Your Own Machine

GAIA is an open-source framework enabling local execution of intelligent agents, eliminating external dependencies and enhancing data control.
#ai-chatbots
Privacy technologies
fromFast Company
1 month ago

If you don't trust Big Tech with your data, this is the chatbot for you

Duck.ai offers powerful AI chatbot capabilities while prioritizing user privacy, contrasting with major players like OpenAI and Google.
Information security
fromEngadget
3 weeks ago

Google adds E2E encryption to Gmail for iOS and Android enterprise users

End-to-end encryption for Gmail on Android and iOS is now available for enterprise users, enhancing privacy and security for email communication.
fromTechzine Global
3 weeks ago

Hospital modernizes data protection with Synology ActiveProtect

The most significant outcome of St. Nikolaus-Hospital's switch to a Synology ActiveProtect Appliance is undoubtedly the ROI reported by the hospital. De Sélys and Bovy expect a 238 percent increase in ROI over the next five years.
Healthcare
EU data protection
fromWIRED
3 weeks ago

Europe Gets Serious About Age Verification Online

Five EU countries are testing a digital wallet for age verification, but progress varies significantly among them.
DevOps
fromSilicon Canals
3 weeks ago

Iran declared AWS, Google, and Microsoft data centers military targets. The legal and strategic fallout is just beginning - Silicon Canals

Iran's military declared U.S. cloud data centers as legitimate military targets, citing international law and the mixing of military and civilian data.
#ai
fromwww.businessinsider.com
3 weeks ago
Remote teams

I'm a Chinese CEO who jumped on the OpenClaw hype and built AI employees. We had to create a human-only Slack channel to escape them.

AI employees can handle repetitive tasks, improving workplace efficiency and allowing humans to focus on creative work.
Information security
fromInfoQ
1 month ago

Securing the AI Stack: From Model to Production

AI has transformed phishing into a high-velocity threat, requiring modern defenses to adopt similar layered tactics.
Remote teams
fromwww.businessinsider.com
3 weeks ago

I'm a Chinese CEO who jumped on the OpenClaw hype and built AI employees. We had to create a human-only Slack channel to escape them.

AI employees can handle repetitive tasks, improving workplace efficiency and allowing humans to focus on creative work.
Information security
fromInfoQ
1 month ago

Securing the AI Stack: From Model to Production

AI has transformed phishing into a high-velocity threat, requiring modern defenses to adopt similar layered tactics.
DevOps
fromComputerWeekly.com
4 weeks ago

How 'Wikipedia of cyber' helps SAP make sense of threat data | Computer Weekly

SAP faces significant challenges in securing enterprise data amidst a complex threat landscape and evolving compliance requirements.
Artificial intelligence
fromTearsheet
4 weeks ago

What a bank-client relationship looks like when banks control the data behind the UX - Tearsheet

Grasshopper's Model Context Protocol enables secure AI integration with banking data while maintaining client control and data security.
#cyberattack
Privacy professionals
fromTechCrunch
1 month ago

Hasbro says it was hacked, and may take 'several weeks' to recover | TechCrunch

Hasbro confirmed a cyberattack, prompting system shutdowns and ongoing investigations, with potential operational disruptions lasting several weeks.
SF politics
fromSFGATE
1 month ago

Bay Area city government without working phones, email after cyberattack

Foster City is experiencing significant disruptions to services due to a cyberattack, with email and phone systems still down after six days.
Information security
fromMedCity News
1 month ago

6 Things to Know About Stryker's Cyberattack - MedCity News

Stryker experienced a cyberattack disrupting internal Microsoft systems worldwide, affecting employee access and order processing, though patient devices remained unaffected.
Privacy professionals
fromTechCrunch
1 month ago

Hasbro says it was hacked, and may take 'several weeks' to recover | TechCrunch

Hasbro confirmed a cyberattack, prompting system shutdowns and ongoing investigations, with potential operational disruptions lasting several weeks.
SF politics
fromSFGATE
1 month ago

Bay Area city government without working phones, email after cyberattack

Foster City is experiencing significant disruptions to services due to a cyberattack, with email and phone systems still down after six days.
Information security
fromMedCity News
1 month ago

6 Things to Know About Stryker's Cyberattack - MedCity News

Stryker experienced a cyberattack disrupting internal Microsoft systems worldwide, affecting employee access and order processing, though patient devices remained unaffected.
Privacy professionals
fromSecurityWeek
1 month ago

FBI Warns of Data Security Risks From China-Made Mobile Apps

Foreign-developed mobile applications pose significant data security risks, particularly those from China, according to an FBI alert.
Information security
fromComputerWeekly.com
1 month ago

Shrinking PQC timeline highlights immediate risk to data security | Computer Weekly

Google's accelerated timeline for post-quantum cryptography highlights urgent data security risks posed by quantum computers that need immediate attention.
#ai-governance
fromInfoQ
1 month ago
Agile

QCon London 2026: Team Topologies as the 'Infrastructure for Agency' with AI

Organizational maturity is crucial for realizing benefits from AI investments, with many firms lacking the necessary governance structures.
fromEntrepreneur
1 month ago
Artificial intelligence

How to Stop Rogue AI From Compromising Your Company's Data

Autonomous AI agents with elevated access pose serious security risks through data breaches, unauthorized changes, and goal misalignment, requiring new governance frameworks beyond traditional cybersecurity protocols.
Agile
fromInfoQ
1 month ago

QCon London 2026: Team Topologies as the 'Infrastructure for Agency' with AI

Organizational maturity is crucial for realizing benefits from AI investments, with many firms lacking the necessary governance structures.
#chatbots
Privacy professionals
fromZDNET
1 month ago

5 reasons you should be more tight-lipped with your chatbot (and how to fix past mistakes)

Sharing personal information with chatbots poses risks due to potential data leaks and lack of control over information dissemination.
Privacy professionals
fromZDNET
1 month ago

Stop telling AI your secrets - 5 reasons why, and what to do if you already overshared

Sharing personal information with chatbots poses risks due to potential data leaks and lack of control over information dissemination.
Privacy professionals
fromZDNET
1 month ago

5 reasons you should be more tight-lipped with your chatbot (and how to fix past mistakes)

Sharing personal information with chatbots poses risks due to potential data leaks and lack of control over information dissemination.
Privacy professionals
fromZDNET
1 month ago

Stop telling AI your secrets - 5 reasons why, and what to do if you already overshared

Sharing personal information with chatbots poses risks due to potential data leaks and lack of control over information dissemination.
#cybersecurity
Privacy technologies
fromEngadget
1 month ago

Tech companies are teaming up to combat scammers

Major tech companies signed the Online Services Accord Against Scams to implement unified fraud detection, security features, and verification measures across platforms while encouraging information sharing with law enforcement.
Privacy technologies
fromEngadget
1 month ago

Tech companies are teaming up to combat scammers

Major tech companies signed the Online Services Accord Against Scams to implement unified fraud detection, security features, and verification measures across platforms while encouraging information sharing with law enforcement.
Information security
fromTNW | Offers
1 month ago

Team password manager costs $1.50 & just added the features businesses actually need

Stolen credentials are a major security risk; using a password manager like Passpack can mitigate this threat effectively.
Marketing tech
fromThe Drum
1 month ago

'We're building the future of advertising on infrastructure we don't control' - and no one's talking about it

The advertising industry is increasingly reliant on third-party frameworks, raising concerns about data security, privacy, and decision-making.
DevOps
fromNew Relic
1 month ago

Automate Log Management via Terraform

Practicing log management as code enhances standardization, performance, security, and cost optimization across services.
EU data protection
fromBusiness Matters
1 month ago

Companies House disciplines over 100 staff amid compliance concerns

Companies House disciplined 132 employees for policy breaches, highlighting operational challenges and the need for stronger data security measures.
Information security
fromReadWrite
1 month ago

The CISO Struggle: How AI is Changing the Data Security Landscape

Generative AI adoption is rapid, but security governance is lagging, creating significant risks for organizations.
Privacy technologies
fromSheFinds
1 month ago

3 Android Apps Experts Say You Should Delete Immediately To Protect Your Data

Certain Android apps, like Facebook and free utility apps, pose significant privacy risks and should be deleted to protect user data.
Information security
fromTechzine Global
1 month ago

Cohesity embeds Sophos malware scanning in Data Cloud

Cohesity integrates Sophos malware scanning into Data Cloud to detect hidden threats in backup data, enhancing recovery confidence post-cyberattacks.
EU data protection
fromInfoQ
1 month ago

QCon London 2026: Kleppmann on Mitigating Europe's Cloud Dependency with Local-First Software

Europe's heavy reliance on US cloud services poses significant risks that need to be addressed through strategic technological choices.
Artificial intelligence
fromTechCrunch
1 month ago

Meta is having trouble with rogue AI agents | TechCrunch

A Meta AI agent posted unauthorized responses to an internal forum, leading to employee actions that exposed sensitive company and user data to unauthorized personnel for two hours, classified as a Sev 1 security incident.
Gadgets
fromComputerworld
1 month ago

Dell: Cut AI cloud costs with data-center class desktops

High-performance AI desktop computers offer powerful processing capabilities but consume significant electricity and command premium prices exceeding $97,000.
Mobile UX
fromGSMArena.com
1 month ago

Instagram is removing end-to-end encryption

Instagram is removing end-to-end encryption from its messaging service effective May 8, allowing Meta and government agencies to access user communications.
Privacy professionals
fromWIRED
1 month ago

John Solly Is the DOGE Operative Accused of Planning to Take Social Security Data to His New Job

A whistleblower complaint alleges DOGE operative John Solly claimed to store sensitive Social Security Administration data on a thumb drive for sharing with his employer Leidos, which both Solly and Leidos deny.
fromwww.npr.org
1 month ago

The government is investigating new claims that DOGE misused Social Security data

According to the Post's reporting, the former DOGE employee claimed at least one database was held on a personal thumb drive, and claimed to have retained "God-level" access to SSA systems, the whistleblower alleged. The former staffer also allegedly told colleagues they wanted to share the data with their private-sector employer, the Post reported.
US news
Information security
fromBusiness Matters
1 month ago

More companies paying ransoms as AI-powered cyberattacks intensify

Ransom payment rates surged to 24.3% in 2025 from 14.4% in 2024, driven by AI-enhanced ransomware attacks targeting sensitive data with greater precision and personalization.
Deliverability
fromWIRED
1 month ago

How to Avoid Getting Locked Out of Your Google Account

Set up Recovery Contacts and two-factor authentication to protect your Google account and regain access if locked out.
Venture
fromSecurityWeek
1 month ago

Data Security Firm Evervault Raises $25 Million in Series B Funding

Evervault raised $25 million in Series B funding to expand infrastructure and develop encryption technology that keeps sensitive data encrypted throughout processing without accessing plaintext.
Privacy professionals
fromTechCrunch
1 month ago

Meta sued over AI smart glasses' privacy concerns, after workers reviewed nudity, sex, and other footage | TechCrunch

Meta faces a U.S. lawsuit alleging privacy violations and false advertising for AI smart glasses after Kenyan subcontractors were found reviewing sensitive customer footage including intimate content.
fromThe Verge
1 month ago

Meta's AI glasses reportedly send sensitive footage to human reviewers in Kenya

Meta's AI-powered smart glasses could be sending sensitive footage to human reviewers in Nairobi, Kenya, according to an investigation by the Swedish outlets Svenska Dagbladet and Göteborgs-Posten. The report claims Meta contractors in Kenya have seen videos captured with the smart glasses that show "bathroom visits, sex and other intimate moments."
Privacy technologies
Information security
fromThe Hacker News
1 month ago

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

Attackers are collecting encrypted data today to decrypt later using quantum computers, requiring organizations to adopt quantum-resistant encryption now to protect long-term sensitive data.
Privacy technologies
fromwww.mercurynews.com
1 month ago

Debate continues over Richmond's use of Flock cameras

Richmond officials debate renewing a $2 million Flock Safety surveillance contract after disabling 150 cameras due to privacy concerns over unauthorized national data access capabilities.
Online learning
fromeLearning Industry
2 months ago

The Complete Offboarding Checklist: A Strategic Guide For HR And L&D Leaders (With Examples And Templates)

Modern offboarding protects institutional knowledge, ensures compliance, strengthens data security, and preserves employer brand reputation through structured processes.
fromThe Mercury News
2 months ago

Flock plate reader use ends in Saratoga and Cupertino

To comply with the policy, we are now restricted from further use. The board's decision was based on mounting concerns about data security and information sharing practices, not the agency's management of the system or the effectiveness of ALPR technology in supporting public safety.
San Jose Sharks
fromTheregister
2 months ago

Microsoft Edge to auto-launch Copilot on every Outlook link

This experience helps users quickly understand content, take action with fewer steps, and get more value from Copilot while extending productive browsing time in Edge.
Miscellaneous
Information security
fromThe Hacker News
2 months ago

Expert Recommends: Prepare for PQC Right Now

Adversaries are stealing encrypted data now to decrypt later using quantum computers, requiring organizations to migrate to post-quantum cryptography immediately to protect long-term sensitive data.
Privacy technologies
fromTheregister
2 months ago

AI takes a swing at online anonymity

Large language models can efficiently deanonymize internet users across multiple platforms by automating the process of connecting anonymous posts to identify individuals with high precision.
Privacy technologies
fromFast Company
2 months ago

Discord delays global age verification rollout after user backlash

Discord postponed its age verification policy to late 2026 after user backlash over privacy concerns, acknowledging the company missed the mark on implementation.
Artificial intelligence
fromTechzine Global
2 months ago

Veeam launches Agent Commander for AI risk management

Veeam's Agent Commander detects AI risks, protects AI systems, and enables rapid error recovery through real-time data and agent monitoring using a Data Command Graph intelligence engine.
Tech industry
fromEntrepreneur
2 months ago

Store 1TB of Company Files for Just $60

OnlineDrive provides 1TB lifetime cloud storage with enterprise-grade security, resumable uploads, regional servers, team workspaces, and S3 infrastructure for $59.99.
fromBusiness Matters
2 months ago

What Happens to Business Technology When It Reaches End of Life?

Most businesses, which includes modern ones, invest heavily in technology, but they rarely plan for its eventual and inevitable exit strategy. Generally speaking, companies spend millions on the latest hardware while overlooking the critical phase when those assets reach their end. This lack of planning creates a massive gap in the operational lifecycle of many otherwise successful global organizations. Decisions made at the end of a device's life carry real business risks that can impact the bottom line financially and environmentally speaking.
Information security
Artificial intelligence
fromThe Daily Star
2 months ago

AI chatbots emerge as new frontier for advertisers

Introducing advertisements and sponsored content in chatbots raises privacy and trust concerns as AI firms seek new revenue while promising not to sell user data.
UK news
fromTheregister
2 months ago

UK blames legacy IT for incomplete data protection progress

Legacy IT systems and reliance on email hinder government technical measures to prevent accidental exposure of highly sensitive data, risking lives and hindering reforms.
fromAbove the Law
2 months ago

I've Taken Steps To Protect My Client's Documents: But What Happens Post-Production? - Above the Law

You're getting ready to make a document production to the other side. You're worried though that the other side may use GenAI tools on the documents that don't ensure they are protected from public disclosure. You ask to see the other side's policies just to be sure. They refuse. You ask the judge for a protective order since some of your documents contain trade secrets.
Law
#ai-security
fromNature
2 months ago

'It means I can sleep at night': how sensors are helping to solve scientists' problems

In fact, Stawicki was on a mission to save the lives of around 1,000 zebrafish ( Danio rerio) in her laboratory. Similarities between lines of hair cells on the fish's flanks and those in the mammalian inner ear enable her to use them as a model to study hearing problems in humans caused by some antibiotics and chemotherapy drugs. A sensor had picked up that the lab's heating system had been knocked out by a power fault.
Science
US politics
fromTheregister
2 months ago

StopICE alerts hacked to sen texts , admins accuse CPB agent

StopICE blamed a CBP agent for attacking its app and sending false text alerts, but StopICE says no user personal data was stored or leaked.
fromMedium
4 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Firewalls can fail, passwords can be stolen, but strong encryption remains your last line of defense. InToday's digital world, protect sensitive personal details is more critical and important than ever. The AES algorithm (Advanced Encryption Standard) algorithm is one of the most trusted and widely used way or method for securing data against unauthorized access and frauded. Advanced Encryption Standard supports different levels like 128-bit, 192-bit, and 256-bit encryption, providing strong security for personal data and more.
Information security
Privacy professionals
from24/7 Wall St.
2 months ago

AARP Calls for Accountability Over Trump Administration Social Security Blunder

Social Security numbers are widely used across institutions, are highly sensitive, and recent government mishandling risks exposing Americans' private data.
US politics
fromTheregister
3 months ago

CISA insider-threat warning comes with an ironic twist

Insider threats are among the most serious security risks and require multidisciplinary teams and decisive action to detect, mitigate, and prevent damage.
Artificial intelligence
fromTechzine Global
3 months ago

Director of cybersecurity service uploaded sensitive documents to ChatGPT

A CISA acting director uploaded official-use-only CISA contract documents into public ChatGPT, triggering security alerts and a DHS investigation.
Information security
fromEntrepreneur
3 months ago

How to Keep Your Company's Data Out of the Wrong Hands

Data security requires keeping sensitive data local, restricting access strictly, and holding vendors to higher standards to prevent breaches, leaks, and legal exposure.
fromeLearning Industry
3 months ago

Why Data Privacy Is Mission-Critical In Corporate eLearning

There's been an explosion in the growth of corporate eLearning initiatives in the post-COVID era. That's due in part to the growth in remote work and geographically distributed teams. Unfortunately, there are always growing pains when any corporate initiative scales up in a hurry. In the case of eLearning, one of those growing pains is a tendency to let data privacy standards fall by the wayside.
Privacy professionals
[ Load more ]