This guide is intended for learners who are considering a career in some aspect of IT security. It offers guidance as to the pathways into the sector, what specialties are available, potential earnings, and an overview of the most well-known security qualifications.
IT
This publication provides a set of procedures for conducting assessments of security and privacy controls employed within systems and organizations.
This paper aims to contribute to the ongoing assessment in the EU and globally of the unprecedented risks posed by this type of surveillance technology.
UK's Information Commissioner's Office (ICO) has published a (draft) guidance on pseudonimisation.
Here is an interssting read I found recently about privacy, data protection and cyber-security. Hope, you'll enjoy and find it useful.
Reuse of passwords may lead to bad consequences - hack of one account may allow attacker to accesses also other accounts.
There are tech companies out there selling spy tools to governments.
An essay about encryption, regulation, their past and future.
The report took a broader look into data protection engineering to support practical implementation of technical aspects of data protection by design and by default.
Kaleidoscope on the Internet of Toys Report by the Joint Research Centre (JRC) on?safety, security, privacy and societal questions emerging?from the rise of the Internet of Toys?- “Internet Connected Toys that constitute,?along with the wave of other domestic connected objects, the Internet of Things”. Read report Who Watches the Watchers? Report from Citi GPS: Global […]