Loading search
July 8, 2021 | Blogs
Ransomware attacks, data breaches, digital theft – on the rise. Who are the cyber-criminals? Can t...
July 1, 2021 | Blogs
On June 28, 2021, the Europe Union granted two adequacy decisions to the United Kingdom for personal...
May 10, 2021 | Blogs
This is a true story of a phone scam of May 2021. The Data Privacy Detective got a call on the home ...
May 3, 2021 | Blogs
This podcast episode explores ransomware from preventive, legal, and communications angles. While th...
April 2, 2021 | Blogs
Janus was the Roman god of doors, gates, and transitions. He needed two faces to look in both direct...
March 25, 2021 | Blogs
Facial recognition. It’s a hot topic. Targeting, misidentification, and doxing – the dangers...
March 18, 2021 | Blogs
Distributed ledger technologies (DLTs) are becoming more prominent with applications across supply c...
March 1, 2021 | Blogs
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule applies only to...
February 17, 2021 | Blogs
Challenges from Europe and America On February 16, 2021 TikTok was sued in Europe for abusing consum...
January 12, 2021 | Blogs
Data theft set new records in 2020. The major causes are not failures of equipment, software, or ser...
July 8, 2021 | Blogs
Ransomware attacks, data breaches, digital theft – on the rise. Who are the cyber-criminals? Can t...
July 1, 2021 | Blogs
On June 28, 2021, the Europe Union granted two adequacy decisions to the United Kingdom for personal...
May 10, 2021 | Blogs
This is a true story of a phone scam of May 2021. The Data Privacy Detective got a call on the home ...