FaceApp is a gigantic cybersecurity risk, and the viral app has gone from fun to dangerous in an instant. Tech geeks like us don’t have all the answers, but most of us who are immersed in this space are flat out concerned about the potential ramifications of FaceApp and the dangers it might possibly pose. And really? What’s the upside? Your photos might end up on a billboard in a foreign country somewhere, or they might be used to train artificial intelligence. Or both. Or they might be used in even more personal, and personally dangerous ways. It’s not really worth it for a few seconds of amusement, or amazement, or whatever it is, at what you might look like 50 years from now—is it?
The news of the massive GDPR fines levied against British Airways and Marriott has gotten the attention of CIOs. More importantly CEOs, investors, and board members are rethinking cybersecurity, realizing that a security-first mindset in all aspects of the organization is critically important.
Pitching your finance and executive teams on security awareness measures is no easy task. Here’s how to discuss return on security investment, security awareness and training.
Last year brought us some of the largest and most complex data and security breaches ever seen. Quora’s data breach by a “malicious third party” exposed the personal data of nearly 100 million users. Marriott International revealed a data breach dating back to 2014 that compromised the personal information—and, perhaps, even credit card details—of as many as 500 million guests. …
Amazon’s patent to use delivery drones for security surveillance is definitely of interest to the physical security industry. Here’s why.
Data breaches can cost companies a lot of money. Most of the costs are fairly obvious, but the hidden costs of data breaches might surprise you.
The cost of cybercrime, outlined in a new report by Accenture, is expected to cost $5.2 trillion over the next 5 years. Here’s what to do about that.
Is privacy overstated? Last week it was announced that Google uses Gmail to track what you buy, and unfortunately, this data trail is hard to delete.
A wide variety of wireless UC presentation systems have been discovered to have significant security exploits and not all have been fixed. Here’s what to do.
Many businesses aren’t as secure as they could be because they believe in dangerous cybersecurity myths.