Remove 2016 Remove Big data Remove Surveillance
article thumbnail

Facebook and Cambridge Analytica

Schneier on Security

Harvard Business School professor Shoshana Zuboff calls it " surveillance capitalism." Equifax is one of those thousands of data brokers, most of them you've never heard of, selling your personal information without your knowledge or consent to pretty much anyone who will pay for it. Surveillance capitalism takes this one step further.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Verodin Cybersecurity analytics 2018 Acquired by FireEye Kenna Security Risk management 2018 Acquired by Cisco PhishMe Incident response 2016 Acquired: P.E. Lightspeed’s enterprise sectors beyond cybersecurity include big data, SaaS, crypto, and IT services. BVP Investments. NEA Investments.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity & Artificial Intelligence (AI) – a view from the EU Rear Window, Part II

McAfee

This concern is echoed by Article 22 of the EU Reg 2016 /679 (“GDPR”): “ The data subject shall have the right not to be subject to a decision based solely on automated processing, including profiling, which produces legal effects concerning him or her or similarly significantly affects him or her.”.

article thumbnail

IoT and Cybersecurity: What’s the Future?

Security Affairs

IoT devices can spy on people, steal data, or bring down vast swathes of the internet, as happened in 2016 when Mirai malware infiltrated devices such as baby monitors and refrigerators and locked them into a botnet for the Dyn cyberattack. Big Data storage systems have weaknesses.

IoT 145
article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

While many envision attacks on smart cars and surveillance cameras, servers exposed to the demilitarized zone (DMZ), such as MoveIT servers , also provide tantalizing edge targets. Edge Exposure Even as attackers pursue API and cloud attacks, more organizations push out computing to edge resources beyond any network controls.