Category: Data Protection

Futurum’s Daniel Newman takes on the fear mongering that’s dominated the media about Amazon Sidewalk in the simplest of terms: it’s a big, fat nothing burger. Here’s why.
Colonial Pipeline rapidly paid ransomware provider DarkSide $5 billion Bitcoin to unlock and restore its IT systems, but this ransomware attack exposed a glaring weakness in critical infrastructure security: the IT/OT issue. Futurum’s Fred McClimans and Shelly Kramer covered this attack in a recent episode of their Cybersecurity Shorts series on the Futurum Tech Webcast and why this may have turned back on the pipeline but doesn’t come close to addressing the real security threats we face today.
In this short video take, Futurum's Daniel Newman and Shelly Kramer discuss the differences between operational trust and technical trust. These two things form the basis of what Confidential Computing is really about.
Microsoft has confirmed a significant security breach of its Exchange email servers and the theft of private emails from businesses, organizations, and government agencies around the world. Futurum’s Fred McClimans breaks down the timeline and what we know so far, and also discusses the behavior issue organizations face regarding on-premises systems.
Some companies are leading the push for better data privacy and are being rewarded with customer loyalty. Here are the standouts you might not have heard about.
In the last 6 months, companies have kept employees productive and safe at home while still accomplishing goals. However, it takes more than just video meetings. Here are some key areas to consider when managing flexible work amidst the pandemic.
Microsoft made a series of enhancements to make its Edge Browser more robust and secure at this year's Ignite Conference.
Apple added that they believe that “technology should protect users’ fundamental right to privacy, and that means giving users tools to understand which apps and websites may be sharing their data with other companies for advertising or advertising measurement purposes, as well as the tools to revoke permission for this tracking.”
A recent cyber-attack against tech company Garmin garners up to $10 million ransom. With ransomware on the rise, it’s just a matter of time before a big attack happens again.
The massive Twitter hack this past week was a wake-up call for many of the vulnerabilities our collective reliance on social media channels presents. Here is a short overview of the specifics that have been uncovered as a result of investigation by the FBI, lawmakers, cybersecurity experts and Twitter itself, as well as what the impact of a hack of this nature means for CISOs and their security vendor partners.
Last year, Facebook had been ordered to stop collecting and combining data across its various platforms without explicit user consent. This latest ruling in Karlsruhe effectively negates the stay granted by the Dusseldorf court, and requires Facebook to once again comply with the original order. This could well trigger a domino effect of regulatory action against Facebook in the EU and the US.
Customer Data Platforms are gaining popularity as companies look to better utilize all available data to deliver customer experiences. IT must work in lock-step with the business and data science teams to make this happen.

Thank you, we received your request, a member of our team will be in contact with you.