What You Need to Know About Florida’s Information Protection Act of 2014 (FIPA)

Learn about the Florida Information Protection Act of 2014 (FIPA) in Data Protection 101, our series on the fundamentals of data security.

Friday Five: 8/16 Edition

Software developers are a target for phishers, a hotel chain breach, and a bank hit by malware - catch up on the week's news with this recap!

SEC Looking Into First American Breach

May's massive breach at First American Financial Corp. exposed 885 million records. Now the company is drawing the attention of regulators, curious if any laws were broken.

Microsoft Urging Users to Patch New Wormable Vulnerabilities

Microsoft is urging users to patch a series of critical, BlueKeep-like vulnerabilities in Windows that could be used to spread malware and affect as many as 800 million machines.

Think Tank: Standard Contractual Clauses for International Transfers Should Mirror GDPR

The Centre for Information Policy Leadership issued a lengthy white paper last week highlighting challenges and recommendations around standard contractual clauses (SCCs) for international data transfers.

Apple Opens Bug Bounty Program to All, Changes Payout Structure

At Black Hat, the head of Apple’s Security Engineering team announced new enhancements to its bug bounty program, including one vulnerability that could fetch a researcher $1M.

Friday Five: 8/9 Edition

Twitter shares user data without permission, malware attacks are on the rise, and more - catch up on the week’s infosec news with this roundup!

Using GDPR Subject Access Requests to Harvest Data

In a talk at this year's Black Hat an Oxford University student explained how he used GDPR Access Requests and a Python script to steal a slew of sensitive information on another person.

Hacking for the Greater Good Has Never Been Easier

Experts on a panel at Black Hat stressed Wednesday that there's never been a greater need for hackers and public interest technologists to foster a safe digital society.

What is Data Security?

Learn about data security and the role it plays in many data protection solutions in Data Protection 101, our series on the fundamentals of data security.