Loading search
July 8, 2021 | Blogs
Ransomware attacks, data breaches, digital theft – on the rise. Who are the cyber-criminals? Can t...
July 1, 2021 | Blogs
On June 28, 2021, the Europe Union granted two adequacy decisions to the United Kingdom for personal...
May 14, 2021 | Blogs
In order to keep up with a changing world, each company must periodically assess how technological c...
May 10, 2021 | Blogs
This is a true story of a phone scam of May 2021. The Data Privacy Detective got a call on the home ...
May 3, 2021 | Blogs
This podcast episode explores ransomware from preventive, legal, and communications angles. While th...
April 9, 2021 | Blogs
On April 5, the U.S. Supreme Court found that Google’s copying of Oracle code was fair use, puttin...
April 2, 2021 | Blogs
Janus was the Roman god of doors, gates, and transitions. He needed two faces to look in both direct...
March 29, 2021 | Blogs
Kentucky has long been considered a national leader in the manufacturing industry given its low cost...
March 25, 2021 | Blogs
Facial recognition. It’s a hot topic. Targeting, misidentification, and doxing – the dangers...
March 18, 2021 | Blogs
Distributed ledger technologies (DLTs) are becoming more prominent with applications across supply c...
July 8, 2021 | Blogs
Ransomware attacks, data breaches, digital theft – on the rise. Who are the cyber-criminals? Can t...
July 1, 2021 | Blogs
On June 28, 2021, the Europe Union granted two adequacy decisions to the United Kingdom for personal...
May 14, 2021 | Blogs
In order to keep up with a changing world, each company must periodically assess how technological c...