Tag: privacy
-
Is Sora 2 the Future of Video? AI, Copyright, and Privacy Issues
OpenAI’s Sora 2 is here, and it’s not just another AI toy. This episode explores how Sora 2 works, how users can insert almost anything into generated content, and why that’s raising alarms about privacy, identity, and copyright. We walk you through the initial opt-out copyright controversy, the backlash from studios and creators, and… First…
-
MSG Accused of Misusing Facial Recognition, Mishandling Data
A former Madison Square Garden executive alleges the company used facial recognition technology to target critics and violate privacy, leading to a wrongful termination and discrimination lawsuit. The case raises major concerns about surveillance, biometric data misuse, and privacy rights. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/msg-accused-of-misusing-facial-recognition-mishandling-data/
-
Most AI privacy research looks the wrong way
Most research on LLM privacy has focused on the wrong problem, according to a new paper by researchers from Carnegie Mellon University and Northeastern University. The authors … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/20/llm-ai-data-privacy-research/
-
Cybersecurity Snapshot: F5 Breach Prompts Urgent U.S. Gov’t Warning, as OpenAI Details Disrupted ChatGPT Abuses
Tags: ai, attack, awareness, backdoor, breach, business, chatgpt, china, cisa, cloud, control, corporate, cve, cyber, cybersecurity, data, data-breach, defense, detection, exploit, framework, fraud, governance, government, group, hacker, incident, infrastructure, Internet, iran, law, LLM, malicious, malware, mitigation, monitoring, network, openai, organized, phishing, privacy, resilience, risk, russia, scam, security-incident, service, software, strategy, supply-chain, technology, threat, training, update, vulnerabilityF5’s breach triggers a CISA emergency directive, as Tenable calls it “a five-alarm fire” that requires urgent action. Meanwhile, OpenAI details how attackers try to misuse ChatGPT. Plus, boards are increasing AI and cyber disclosures. And much more! Key takeaways A critical breach at cybersecurity firm F5, attributed to a nation-state, has triggered an urgent…
-
TDL 007 – Cyber Warriors Digital Shadows: Insights from Canada’s Cybersecurity Leader
Tags: ai, awareness, backup, breach, browser, business, cio, ciso, communications, conference, control, corporate, country, cryptography, cyber, cybersecurity, dark-web, data, data-breach, defense, dns, email, encryption, finance, government, healthcare, identity, incident, infrastructure, intelligence, Internet, jobs, law, leak, linux, malicious, mfa, mitigation, network, organized, phone, privacy, ransom, ransomware, RedTeam, resilience, risk, risk-management, router, service, startup, strategy, supply-chain, switch, tactics, technology, theft, threat, tool, training, windowsSummary In this episode of The Defender’s Log, host David Redekop interviews Sami Khoury, the Senior Official for Cybersecurity for the Government of Canada. With a career spanning 33 years at the Communication Security Establishment (CSE), Khoury shares how a coincidental job application blossomed into a lifelong passion for national security. Khoury emphasizes that modern…
-
Google Patches Critical Chrome Vulnerability (CVE-2025-11756) in Safe Browsing Component
Google has issued an urgent security update for its Chrome browser, addressing a high-severity vulnerability tracked as CVE-2025-11756. This flaw, which affects Chrome’s Safe Browsing feature, could allow attackers to execute arbitrary code on users’ machines, posing a direct threat to user privacy and system security. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/chrome-bug-cve-2025-11756/
-
Critical insights QA: AcceleTrex pilots a trust-first, privacy-led model to reinforce business outcomes
I’ve been writing about data trust and privacy engineering for more than a decade. Related: Preserving privacy can be profitable In 2015, I sat down with Cisco’s privacy lead, Michelle Dennedy, who argued that privacy must be grounded in… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/critical-insights-qa-acceletrex-pilots-a-trust-first-privacy-led-model-to-reinforce-business-outcomes/
-
Critical insights QA: AcceleTrex pilots a trust-first, privacy-led model to reinforce business outcomes
I’ve been writing about data trust and privacy engineering for more than a decade. Related: Preserving privacy can be profitable In 2015, I sat down with Cisco’s privacy lead, Michelle Dennedy, who argued that privacy must be grounded in… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/critical-insights-qa-acceletrex-pilots-a-trust-first-privacy-led-model-to-reinforce-business-outcomes/
-
Critical insights QA: AcceleTrex pilots a trust-first, privacy-led model to reinforce business outcomes
I’ve been writing about data trust and privacy engineering for more than a decade. Related: Preserving privacy can be profitable In 2015, I sat down with Cisco’s privacy lead, Michelle Dennedy, who argued that privacy must be grounded in… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/critical-insights-qa-acceletrex-pilots-a-trust-first-privacy-led-model-to-reinforce-business-outcomes/
-
Critical insights QA: AcceleTrex pilots a trust-first, privacy-led model to reinforce business outcomes
I’ve been writing about data trust and privacy engineering for more than a decade. Related: Preserving privacy can be profitable In 2015, I sat down with Cisco’s privacy lead, Michelle Dennedy, who argued that privacy must be grounded in… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/critical-insights-qa-acceletrex-pilots-a-trust-first-privacy-led-model-to-reinforce-business-outcomes/
-
AI and the Golden Age of Surveillance
AI has ended the age of inefficient surveillance. Explore how automation, data, and machine learning are reshaping privacy, power, and the Fourth Amendment. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/ai-and-the-golden-age-of-surveillance/
-
AI and the Golden Age of Surveillance
AI has ended the age of inefficient surveillance. Explore how automation, data, and machine learning are reshaping privacy, power, and the Fourth Amendment. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/ai-and-the-golden-age-of-surveillance/
-
Cybersecurity Awareness Month: How eCommerce Founders Can Build Trust and Security That Scales
Cybersecurity Awareness Month: How eCommerce Founders Can Build Trust and Security That Scales Introduction: Awareness Means Nothing Without Action October is Cybersecurity Awareness Month, but awareness alone doesn’t protect your store. Every Q4, eCommerce founders double down on sales, but attackers double down too. The question is no longer “Will I be targeted?” but…The post…
-
Cybersecurity Awareness Month: How eCommerce Founders Can Build Trust and Security That Scales
Cybersecurity Awareness Month: How eCommerce Founders Can Build Trust and Security That Scales Introduction: Awareness Means Nothing Without Action October is Cybersecurity Awareness Month, but awareness alone doesn’t protect your store. Every Q4, eCommerce founders double down on sales, but attackers double down too. The question is no longer “Will I be targeted?” but…The post…
-
Cybersecurity Awareness Month: How eCommerce Founders Can Build Trust and Security That Scales
Cybersecurity Awareness Month: How eCommerce Founders Can Build Trust and Security That Scales Introduction: Awareness Means Nothing Without Action October is Cybersecurity Awareness Month, but awareness alone doesn’t protect your store. Every Q4, eCommerce founders double down on sales, but attackers double down too. The question is no longer “Will I be targeted?” but…The post…
-
UK ICO Fines Capita 14M Pounds Over 2023 Hack
Capita Ignored EDR Alert for 58 Hours, Say Investigators. British outsourcing giant Capita must pay 14 million pounds to British data regulators for privacy violations tied to a 2023 hack that impacted 6 million individuals. An EDR system caught the malicious file within 10 minutes but the company didn’t respond to the alert until 58…
-
The Compliance Automation Revolution 2025
In 2025, compliance is no longer a box-ticking exercise, it’s a strategic business imperative. With new regulations like the EU’s NIS2 Directive, DORA for financial services, CMMC 2.0 for U.S. defense, and the Australian Privacy Act 2024, enterprises face tougher obligations, faster reporting timelines, and penalties reaching into the tens of millions. Yet most First…
-
13 cybersecurity myths organizations need to stop believing
Tags: access, ai, attack, authentication, backup, banking, breach, business, ceo, compliance, computer, computing, corporate, credentials, cyber, cybersecurity, data, data-breach, deep-fake, defense, encryption, finance, government, group, identity, incident response, infrastructure, jobs, law, malicious, mfa, monitoring, network, nist, openai, passkey, password, phishing, privacy, regulation, risk, service, skills, strategy, technology, theft, threat, tool, vulnerabilityBig tech platforms have strong verification that prevents impersonation: Some of the largest tech platforms like to talk about their strong identity checks as a way to stop impersonation. But looking good on paper is one thing, and holding up to the promise in the real world is another.”The truth is that even advanced verification…
-
Privacy Leaders Now Bridge AI, Data and Business Goals
Jumio’s Joe Kaufmann on How CPOs Drive Value by Aligning Privacy With Business. Privacy leaders are taking on strategic roles as artificial intelligence and data protection laws evolve. Jumio’s Global Privacy Head Joe Kaufmann said chief privacy officers now help build data trust, manage compliance and enable business growth through responsible data use. First seen…
-
One Leader, Two Roles: The CISO-DPO Hybrid Model
Blending Cybersecurity Strength With Data Protection Accountability A new hybrid leadership role is emerging that combines the technical rigor of a CISO with the legal acumen of a data protection officer. Enterprises can create an ecosystem where security and privacy reinforce each other, and organizations can foster collaboration and build trust. First seen on govinfosecurity.com…
-
What if your privacy tools could learn as they go?
A new academic study proposes a way to design privacy mechanisms that can make use of prior knowledge about how data is distributed, even when that information is incomplete. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/14/adaptive-data-privacy-tools/
-
What if your privacy tools could learn as they go?
A new academic study proposes a way to design privacy mechanisms that can make use of prior knowledge about how data is distributed, even when that information is incomplete. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/14/adaptive-data-privacy-tools/
-
What Chat Control means for your privacy
The EU’s proposed Chat Control (CSAM Regulation) aims to combat child sexual abuse material by requiring digital platforms to detect, report, and remove illegal content, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/14/benjamin-schilz-wire-chat-control-privacy-rights-risks/
-
NDSS 2025 IMPACT 2025, Opening Remarks and Keynote 1
Author, Creator, Presenter & Keynote Speaker: Sofia Celi, Senior Cryptography Researcher, Brave Workshop on Innovation in Metadata Privacy: Analysis and Construction Techniques (IMPACT) 2025 Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the organization’s’ YouTube channel. Permalink First…
-
NDSS 2025 IMPACT 2025, Opening Remarks and Keynote 1
Author, Creator, Presenter & Keynote Speaker: Sofia Celi, Senior Cryptography Researcher, Brave Workshop on Innovation in Metadata Privacy: Analysis and Construction Techniques (IMPACT) 2025 Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the organization’s’ YouTube channel. Permalink First…
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
USENIX 2025: PEPR ’25 Using GenAI to Accelerate Privacy Implementations
Creators, Authors and Presenters: Rituraj Kirti, Software Engineer – Meta & Rajkishan Gunasekaran, Software Engineer – Meta Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-using-genai-to-accelerate-privacy-implementations/
-
Cybersecurity Snapshot: AI Security Skills Drive Up Cyber Salaries, as Cyber Teams Grow Arsenal of AI Tools, Reports Find
Tags: access, advisory, ai, attack, authentication, breach, business, ciso, cloud, computing, credentials, cve, cyber, cybersecurity, data, defense, endpoint, exploit, extortion, finance, framework, fraud, google, governance, guide, hacker, hacking, identity, incident response, Internet, iot, jobs, login, microsoft, monitoring, network, nist, oracle, organized, password, privacy, ransomware, risk, risk-assessment, risk-management, scam, skills, technology, threat, tool, training, update, vulnerability, vulnerability-management, zero-dayWant recruiters to show you the money? A new report says AI skills are your golden ticket. Plus, cyber teams are all in on AI, including agentic AI tools. Oh, and please patch a nasty Oracle zero-day bug ASAP. And get the latest on vulnerability management, IoT security and cyber fraud. Key takeaways Eager to…

