Tag: privacy
-
Building Trust in AI SOC Analyst Solutions: A UK and EU CISO Perspective
Tags: access, ai, best-practice, ciso, control, data, endpoint, framework, GDPR, governance, incident response, international, metric, nis-2, privacy, risk, socBy Brett Candon, VP International at Dropzone AI Trust has always been critical in security operations, but in the UK and Europe it carries significant regulatory weight. GDPR, NIS2 and similar related data”‘protection frameworks shape far more than legal risk, they directly influence architectural decisions, supplier selection, and how security data can be accessed, processed…
-
WhatsApp is giving parents peace of mind over their kids’ privacy
WhatsApp has introduced parent-managed accounts designed for pre-teens, giving parents and guardians new controls over contacts, group participation, and how the app is used. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/12/whatsapp-parent-managed-accounts-contacts-controls/
-
DHS Ousts CBP Privacy Officers Who Questioned ‘Illegal’ Orders
Department of Homeland Security leaders removed top privacy officers who objected to mislabeling government records to block their public release, WIRED has learned. First seen on wired.com Jump to article: www.wired.com/story/cbp-privacy-threshold-analysis-foia/
-
Inference protection for LLMs: Keeping sensitive data out of AI workflows
Inference protection is a preventive approach to LLM privacy that stops sensitive data from ever reaching AI models. Learn how de-identification enables secure, compliant AI workflows with unstructured text. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/inference-protection-for-llms-keeping-sensitive-data-out-of-ai-workflows/
-
The Economic Argument: The Real Cost of Insecure APIs in the AI Era
Tags: access, ai, api, application-security, attack, business, compliance, control, corporate, cybersecurity, data, defense, exploit, finance, flaw, framework, governance, identity, injection, international, jobs, malicious, privacy, regulation, risk, threat, tool, vulnerabilityWhen cybersecurity teams talk about risk, they usually speak in technical terms like vulnerabilities, exploits, and attack vectors. But when they walk into the boardroom, they need to speak a different language. They need to speak about cost. In the era of AI, the cost of insecure APIs has shifted from a potential liability to…
-
TikTok Says No to EndEnd Encryption: Here’s Why That’s a Big Deal
In a move that bucks the entire industry trend, TikTok has confirmed it will not implement end-to-end encryption (E2EE) for direct messages on its platform, arguing that E2EE would make users less safe. We break down what’s really going on: the child safety argument, the privacy counterargument, the geopolitical questions surrounding ByteDance, and what… First…
-
Ring’s Jamie Siminoff has been trying to calm privacy fears since the Super Bowl, but his answers may not help
Tags: privacyThe facial recognition question is where things get more tangled. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/08/rings-jamie-siminoff-has-been-trying-to-calm-privacy-fears-since-the-super-bowl-but-his-answers-may-not-help/
-
WiFi Signals Can Track Human Activity Through Walls by Mapping Body Keypoints
In late February 2026, an open-source project named RuView (formerly WiFi DensePose) surged to the top of GitHub trending lists. This edge AI system proves that everyday WiFi signals can track human movement, estimate body poses, and monitor vital signs through walls, all without using a single camera. While marketed as a privacy-friendly tool for…
-
AI Auditability: Why Leaders Must Prove How AI Makes Decisions
AI Auditability: Why Leaders Must Prove How AI Makes Decisions We’ve officially entered the “production phase” of Artificial Intelligence. In just a few short years, AI has moved from experimental pilots to being embedded in nearly every major business function”, by some estimates, used regularly by 88% of organizations. But there is a growing, uncomfortable…
-
AI Auditability: Why Leaders Must Prove How AI Makes Decisions
AI Auditability: Why Leaders Must Prove How AI Makes Decisions We’ve officially entered the “production phase” of Artificial Intelligence. In just a few short years, AI has moved from experimental pilots to being embedded in nearly every major business function”, by some estimates, used regularly by 88% of organizations. But there is a growing, uncomfortable…
-
Trump’s cyber strategy emphasizes offensive operations, deregulation, AI
Industry reaction and next steps: Industry reaction was broadly positive, though notably, many of the strongest endorsements came from cybersecurity firms likely to benefit from the strategy’s emphasis on AI adoption and expanded private-sector roles in national defense.Drew Bagley, chief privacy and policy officer at CrowdStrike, said in a statement, “This strategy addresses modern threats…
-
Zero-Knowledge Proofs for Privacy-Preserving Context Validation
Tags: privacyExplore how zero-knowledge proofs (ZKPs) secure Model Context Protocol (MCP) deployments with privacy-preserving validation and post-quantum resistance. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/zero-knowledge-proofs-for-privacy-preserving-context-validation/
-
New OneTrust CEO on Why AI Governance Market Is Set to Surge
New CEO John Heyman Says Enterprises Need Tools to Manage Thousands of AI Agents. New OneTrust CEO John Heyman said enterprises rapidly deploying generative AI will soon manage hundreds or thousands of AI agents across their organizations. They must monitor AI agents’ data flows and third-party technologies as privacy risk and security oversight increasingly converge.…
-
ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
Some weeks in cybersecurity feel routine. This one doesn’t.Several new developments surfaced over the past few days, showing how quickly the threat landscape keeps shifting. Researchers uncovered fresh activity, security teams shared new findings, and a few unexpected moves from major tech companies also drew attention.Together, these updates offer a useful snapshot of what is…
-
‘We’re not trying to remake the economy’: FTC’s Mufarrige charts new course on tech enforcement
The FTC’s Bureau of Consumer Protection chief discussed the agency’s embrace of age verification and how industry should think about data privacy enforcement under his watch. First seen on therecord.media Jump to article: therecord.media/ftc-mufarrige-interview-chart-new-course-on-tech-enforcement
-
Top 10 Best Cybersecurity Marketing Agencies to Watch in 2026
Tags: ciso, cyber, cybersecurity, dark-web, marketplace, monitoring, privacy, software, threat, tool, zero-trustAs the digital threat landscape continues to evolve rapidly, the marketplace for security solutions has become fiercely congested. For B2B vendors, whether you are selling enterprise Zero Trust architecture, dark web monitoring tools, or consumer-grade privacy software, standing out requires more than just a superior technical product. You need to capture the attention of CISOs,…
-
Workers reviewing Meta Ray-Ban footage encounter users’ intimate moments
Bank details and intimate moments captured without people realizing they are being recorded are the new privacy nightmare behind the latest tech fashion hit, Meta Ray-Ban … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/05/meta-ray-ban-smart-glasses-privacy-risks/
-
Best DeleteMe Alternatives (2026): Competitors and Comparisons
Best DeleteMe alternatives for 2026 compared, including Incogni, Optery, Aura, Kanary, and Privacy Bee for data broker removal and privacy protection. First seen on hackread.com Jump to article: hackread.com/deleteme-alternatives-2026-competitors-comparisons/
-
Cyber Defense Magazine – A New Bell Rings For K-12 Cloud Security After the Illuminate Settlement
This article was originally published in Cyber Defense Magazine on 02/09/26 by Charlie Sander. The Illuminate incident serves as a crucial reminder to edtech vendors of the potential backlash that can occur when privacy promises are not upheld In a recent complaint, the FTC addresses Illuminate Education’s need to strengthen its data security after a breach…
-
How to know you’re a real-deal CSO, and whether that job opening truly seeks one
Tags: access, ai, breach, business, communications, compliance, control, cyber, data, data-breach, finance, framework, governance, incident response, infosec, insurance, jobs, metric, privacy, radius, risk, skills, strategy, threat, training, vulnerabilityStriking the right balance of experience and responsibility: Mark G. McCreary, partner and chief AI and IT security officer at Boston-based legal firm Fox Rothschild LLP, has seen both extremes: security being completely sidelined and security professionals given excessive, unjustified authority.In some firms, a newly appointed CSO might be positioned as a gatekeeper without the…
-
Groups Push Back on HHS’ Proposed Health IT Rollbacks
CHIME, AHA, Others Contend Privacy, Security Burden Would Shift to Providers. Proposals to eliminate certain longstanding health IT certification criteria – including privacy and security related controls – will shift regulatory burden from health IT developers to healthcare providers, some industry groups contend in their public response to proposed federal rulemaking. First seen on govinfosecurity.com…
-
Motorola Plans GrapheneOS-Compatible Devices as Early as 2027
Tags: privacyMotorola confirms a long-term partnership with GrapheneOS, signaling plans for privacy-focused smartphones that could arrive as early as 2027. The post Motorola Plans GrapheneOS-Compatible Devices as Early as 2027 appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-motorola-grapheneos-partnership-2027/
-
California fines national high school ticketing platform $1.1 million for privacy violations
The CPPA alleges that PlayOn Sports collected students’ personal data and delivered targeted advertising by using tracking technologies without providing a “sufficient way to opt out.” First seen on therecord.media Jump to article: therecord.media/california-fines-national-high-school-ticketing-platform-privacy
-
NDSS 2025 Siniel: Distributed Privacy-Preserving zkSNARK
Tags: blockchain, china, computer, computing, conference, cryptography, data, framework, Internet, network, oracle, privacySession 14B: Privacy & Cryptography 2 Authors, Creators & Presenters: Yunbo Yang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Yuejia Cheng (Shanghai DeCareer Consulting Co., Ltd), Kailun Wang (Beijing Jiaotong University), Xiaoguo Li (College of Computer Science, Chongqing University), Jianfei Sun (School of Computing and Information Systems, Singapore Management University), Jiachen…
-
NDSS 2025 Siniel: Distributed Privacy-Preserving zkSNARK
Tags: blockchain, china, computer, computing, conference, cryptography, data, framework, Internet, network, oracle, privacySession 14B: Privacy & Cryptography 2 Authors, Creators & Presenters: Yunbo Yang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Yuejia Cheng (Shanghai DeCareer Consulting Co., Ltd), Kailun Wang (Beijing Jiaotong University), Xiaoguo Li (College of Computer Science, Chongqing University), Jianfei Sun (School of Computing and Information Systems, Singapore Management University), Jiachen…
-
Meta AI in WhatsApp organizes chats and reopens privacy issues
The trend of integrating AI into digital platforms continues. In the latest Android beta release (2.26.9.4), the company has introduced a feature that allows users to organize … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/02/whatsapp-chats-meta-ai-user-privacy/
-
Bug in Google’s Gemini AI Panel Opens Door to Hijacking
Attackers could have exploited the vulnerability to escalate privileges, violate user privacy while browsing, and access sensitive resources. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/bug-google-gemini-ai-panel-hijacking
-
Bug in Google’s Gemini AI Panel Opens Door to Hijacking
Attackers could have exploited the vulnerability to escalate privileges, violate user privacy while browsing, and access sensitive resources. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/bug-google-gemini-ai-panel-hijacking
-
Bug in Google’s Gemini AI Panel Opens Door to Hijacking
Attackers could have exploited the vulnerability to escalate privileges, violate user privacy while browsing, and access sensitive resources. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/bug-google-gemini-ai-panel-hijacking

