Individuals are not present in information systems; only data about individuals is. Therefore, the relationship that exists between a piece of information and the person or people who are associated with it is what we mean when we talk about identity. As an illustration, a data item may be created…
Tag
PRIVACY
In the dynamic realm of artificial intelligence (AI), enterprises confront various hurdles in safeguarding the security and privacy of their machine learning (ML) models. The fragmented nature of the AI landscape often results in divergent development endeavors, manual oversight, and incongruous governance standards, impeding scalability and regulatory adherence. Nevertheless, by…
In our fast-paced, hyper-connected world, where information flows constantly and digital technology is universal, the triad of Information Technology, Security, and Privacy has emerged as a profound and inseparable connection. This dynamic convergence of forces shapes the way we work, interact, and secure our most valuable assets – information and…
Information Technology (IT), Security, and Privacy are becoming more and more important by the day in this digital age. The immergence of IT, allowed people to be able to communicate, connect, and innovate at an extraordinary scale, simultaneously creating an increase of interest in the field and many rapid advancements,…
Information Technology (IT), Security, and Privacy are becoming more and more important by the day in this digital age. The immergence of IT, allowed people to be able to communicate, connect, and innovate at an extraordinary scale, simultaneously creating an increase of interest in the field and many rapid advancements,…
It used to be that we thought of government surveillance as something that happened under authoritarian regimes. Yet in recent times, there has been an explosion of surveillance and intrusion in even the most liberal democracies. That surveillance can take many different forms, from CCTV coverage to internet monitoring. For…
To stand out from the crowd, organizations are required to look beyond compliance with regulatory frameworks only. Privacy by Design – Where it all started “Do you understand, accept, and agree to the terms and conditions?” Think about the number of times your answer has been “yes,” without considering the…
IoT promises to be an extraordinary revolution in our day-to-day life. But how will we respond to the new cybersecurity and privacy threats that this new technology poses? What standards do we already have in place, and where is the global security discourse situated regarded this matter? …
In late April this year, Facebook announced that it has set aside $3 to $5 billion to negotiate a settlement agreement with the US Federal Trade Commission over a complaint of mishandled users’ personal data, which emerged in light of to the Cambridge Analytica scandal in March 2018. The company’s…
Estonia is known as a pioneer in building e-country solutions. Some examples are e-government solutions, e-identity, e-voting, etc. My intention is to add to this list cybersecurity-related solutions, based on the fact that Estonia holds the number one position on the National Cyber Security Index (NCSI) ranking. I am not…