The chapter tells the story of the Target breach and the lessons that can be learned from it about the shortcomings of data security law.
cybersecurity
IT teams need full visibility into every device, software installation, and user, as well as the ability to document all of the IT resources.

The messaging app’s Russian-born co-founder says: “Privacy is sacred – now more than ever”.

Researchers have discovered a novel way of exploiting Amazon Echo smart speakersto perform commands.

UK watchdog says app was not clear about how data is used and it may consider ‘further regulatory action’

You need to switch on E2EE in group meetings, watch out for US Cloud Act, warns impact assessment.

Cookies are on the way out—but not enough is being done about browser fingerprinting. So what is it?

The popular Beijing-based app has “carte blanche” in gathering users’ data, cypersecurity experts say.

European law-enforcement agencies have been pushing to end encryption and survey everyone’s online communications.

A serious Safari bug can disclose information about your recent browsing history and even some info of the logged-in Google account.
