Remove 2000 Remove Surveillance Remove Technology
article thumbnail

What is Employee Monitoring? Full Guide to Getting It Right

eSecurity Planet

From facial recognition to surveillance cameras to time trackers or just having a couple guys standing over employees’ shoulders, there are a multitude of ways to make sure employees are staying on-task and being productive. This is a common selling point of the technology, but is there evidence backing up these claims?

article thumbnail

CYBERSEC Global 2020 Goes Digital – Register Now

Responsible Cyber

In cybersecurity conference circuit, CYBERSEC distinguishes itself from other conferences by not focusing only on the technology but instead taking a holistic, multi-domain, and strategic approach to cybersecurity as the backbone of further digital development of nations and economies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Schrems II – A few Things to Keep in Mind!

McAfee

The Safe Harbor was replaced by the Privacy Shield, which – together with European Standard Clauses (“SCCs”) – were suspected of not being able to sufficiently protect European rights against US massive surveillance. 3] “Maximillian Schrems / Data Protection Commissioner”, decision 2000/520/CE, Case C-362/14. [4] 4] [link]. [5]

article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

I think the whole white hat black hat thing came out of DEF CON, circa 2000. So I'm an activist, security researcher or even whistleblower, we recently came across some stuff where there were leaks of personally identifiable information or some sort of previously unknown surveillance of people or employees. Yes, we show you know this.

Hacking 52
article thumbnail

Bytes, Books, and Blockbusters: The NetSPI Agents’ Top Cybersecurity Fiction Picks

NetSpi Executives

From thrilling films that highlight the dangers of cyberattacks to cautionary tales that explore the ethical dilemmas of technology, these selections offer both engaging stories and valuable lessons. Themes of cryptography, information technology, and the intersection of history and modernity are explored throughout the story.

article thumbnail

Pegasus spyware has been here for years. We must stop ignoring it

Malwarebytes

When weaponized by authoritarian governments, surveillance chills free speech, scares away dissent, and robs an innocent public of a life lived unwatched, for no crime committed other than speaking truth to power, conducting public health research, or simply loving another person.

Spyware 127
article thumbnail

The Hacker Mind Podcast: The Gentle Art of Lockpicking

ForAllSecure

Initially, many of us were exposed to the tool, through some of the Dutch hackers who were mainstays at American hacker conferences right around 2000. We have modern smartphones with some of the best photo technology to date. So, when the Dutch Toool chapters, especially Bode Wells who's a name that comes up a great deal.

Hacking 52