LOKKER introduces web privacy risk summary for insurers
LOKKER released a new privacy solution for insurers: the ability to share on-demand web privacy risk reports with their insureds. These reports give insurers and the insured companies a simple view of their data privacy risk profile in eight differen.....»»
Canadian insurers and municipalities sharing data could improve availability, affordability of flood insurance
The increasing cost of flood damage has seen property insurance become less affordable for many Canadians. New research from the University of Waterloo shows that if insurers and local governments pooled information on investment in flood-risk manage.....»»
Addigy introduces MDM solutions for controlling Apple Intelligence
Addigy's new mobile device management controls empower IT administrators, giving them the capability to test and manage Apple's upcoming AI features, putting them in control of their systems.IT admins can test Apple Intelligence features ahead of lau.....»»
Expel partners with Wiz to enhance security for cloud environments
Expel announced a new strategic partnership with Wiz, a cloud-native application protection platform (CNAPP). The partnership provides an integration offering MDR for Wiz toxic risk combinations (including vulnerabilities, secrets, malware, and threa.....»»
Fortinet introduces sovereign SASE and GenAI capabilities
Fortinet announced the addition of sovereign SASE and GenAI capabilities to its unified SASE solution. Fortinet Unified SASE provides complete integration between Fortinet’s Secure SD-WAN solution and cloud-delivered security service edge (SSE) und.....»»
Cybersecurity jobs available right now: August 28, 2024
Business Information Security Officer Toyota North America | USA | On-site – View job details Acting as an Information Security ambassador to the business, this role works with technology, data, risk, business, and the larger TFS Info.....»»
AI modeling can deliver more benefits, less risk for water partnerships
A Cornell-led research collaboration found that cooperative partnerships seeking to spread the cost burden of water infrastructure projects among regional stakeholders often end up forcing local partners to bear the brunt of underlying supply and fin.....»»
Proton unveils Proton Drive for Business
Proton Drive for business is here, with security and privacy as a priority.....»»
Snapchat finally introduces native iPad support with its latest update
Snapchat was launched for iOS in 2011, but since then the app has only had iPhone support. iPad users, on the other hand, could only run the iPhone app with huge black borders around it. 13 years later, Snapchat is finally introducing native support.....»»
How to prioritize data privacy in core customer-facing systems
Evolving global data privacy regulations are keeping marketers on their toes. In April 2024, the American Privacy Rights Act (APRA) was introduced in the Senate. The proposed bill would create a federal consumer privacy framework akin to the GDPR, wh.....»»
Study IDs best "red flags" auditors can use to spot financial fraud
A new analysis of the benchmarks that auditors use to identify financial statement fraud risk finds that the most commonly used benchmarks are less effective at identifying fraud than benchmarks that are less commonly used......»»
Automakers need to prioritize privacy to leverage consumer data, experts say
A voice of the industry that is growing louder says consumer privacy is not only ethically correct, but also central to the financial success of connected-car ventures......»»
Hotel room key cards everywhere could be at risk from RFID security flaw
Security researchers find flawed contactless cards dating back to late 2007, and urge users to be careful......»»
Drawbridge expands cyber risk assessment service
Drawbridge released its next generation cyber risk assessment service. Provided as a suite of modules, the solution combines a set of analytics with Drawbridge’s client service. Clients can now benchmark and score their cyber programs to prioritize.....»»
Vulnerability prioritization is only the beginning
To date, most technology solutions focused on vulnerability management have focused on the prioritization of risks. That usually took the shape of some risk-ranking structure displayed in a table with links out to the CVEs and other advisory or threa.....»»
I just learned why the fastest VPN isn’t always the best option
Hotspot Shield is one of the fastest VPNs available, so I reviewed it to test the features, quality, privacy, and customer support......»»
Apple splits App Store team in two, introduces new leadership
This is the latest in a series of changes resulting from EU regulation. Enlarge / The Apple Park campus in Cupertino, California. (credit: Anadolu Agency | Getty) Apple is comprehensively restructuring its long-standing.....»»
LibreOffice 24.8: More privacy, interoperability improvements
LibreOffice 24.8, the new major release of the free Windows, macOS, and Linux office suite, is now available. This is the first to provide an official package for Windows PCs based on ARM processors. The LibreOffice advantage LibreOffice is the best.....»»
A survival guide for data privacy in the age of federal inaction
Things change fast in the world of data privacy. Just earlier this year, the question I was being asked most frequently was, “How similar will the proposed federal privacy law (APRA) be to the EU’s GDPR?” Now that APRA is pretty much dead on ar.....»»
Microsoft will try the data-scraping Windows Recall feature again in October
Initial Recall preview was lambasted for obvious privacy and security failures. Enlarge / The Recall feature provides a timeline of screenshots and a searchable database of text, thoroughly tracking everything about a person's PC.....»»
Study calls for locally inclusive public health adaptation strategies to climate change
Modern disaster risk reduction strategies must incorporate Indigenous knowledge and local cultural practices to be adoptable and sustainable, according to a descriptive phenomenological study carried out in Kenya by researchers from the University of.....»»