This guide is intended for learners who are considering a career in some aspect of IT security. It offers guidance […]
IT
This publication provides a set of procedures for conducting assessments of security and privacy controls employed within systems and organizations.
This paper aims to contribute to the ongoing assessment in the EU and globally of the unprecedented risks posed by this type of surveillance technology.
UK's Information Commissioner's Office (ICO) has published a (draft) guidance on pseudonimisation.
Here is an interssting read I found recently about privacy, data protection and cyber-security. Hope, you'll enjoy and find it useful.
Reuse of passwords may lead to bad consequences - hack of one account may allow attacker to accesses also other accounts.
There are tech companies out there selling spy tools to governments.
An essay about encryption, regulation, their past and future.
The report took a broader look into data protection engineering to support practical implementation of technical aspects of data protection by design and by default.
Kaleidoscope on the Internet of Toys Report by the Joint Research Centre (JRC) on?safety, security, privacy and societal questions emerging?from […]