Remove Data collection Remove Presentation Remove Risk
article thumbnail

Dan Solove on Privacy Regulation

Schneier on Security

As to privacy, consent authorizes and legitimizes a wide range of data collection and processing. Rather than provide extensive legitimacy and power, murky consent should authorize only a very restricted and weak license to use data. There are generally two approaches to consent in privacy law.

article thumbnail

GUEST ESSAY: Privacy risks introduced by the ‘metaverse’ — and how to combat them

The Last Watchdog

To test the true extent of data collection in VR, we designed a simple 30-person user study called MetaData. In a follow-up work, called “ MetaGuard ,” we present a promising solution to our VR data privacy woes. But until recently, the VR privacy threat has remained entirely theoretical.

Risk 222
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Greatest Asset Becomes the Biggest Risk

CyberSecurity Insiders

It’s never been more important to protect employees from cyber-attacks while also mitigating the risk they pose as trusted insiders. Dtex’s Workforce Cyber Intelligence Platform enables organizations better understand their workforce, protect their data and make human-centric operational investments.

Risk 134
article thumbnail

Amazon Alexa Skills Present Security Risks

eSecurity Planet

Researchers now believe that the rapid adoption of these skills could have implications for information security as they could open Alexa users up to phishing or invasive data collection. The post Amazon Alexa Skills Present Security Risks appeared first on eSecurityPlanet. What is an Amazon Alexa Skill?

Risk 77
article thumbnail

Introducing continuous remote worker visibility and expanded data collection with Secure Network Analytics Release 7.3.2

Cisco Security

It’s no secret that last year’s abrupt exodus away from corporate offices presented organizations with novel challenges related to monitoring and securing their newly remote workforce. To summarize, visibility evaporated, and meanwhile, organizational risk levels spiked parabolically. With release 7.3.2, Has anyone “gone rogue”?

article thumbnail

Introducing continuous remote worker visibility and expanded data collection with Secure Network Analytics Release 7.3.2

Cisco Security

It’s no secret that last year’s abrupt exodus away from corporate offices presented organizations with novel challenges related to monitoring and securing their newly remote workforce. To summarize, visibility evaporated, and meanwhile, organizational risk levels spiked parabolically. With release 7.3.2, Has anyone “gone rogue”?

article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

The vulnerability Context Security discovered meant exposing the Wi-Fi credentials of the network the device was attached to, which is significant because it demonstrates that IoT vulnerabilities can put other devices on the network at risk as well. Are these examples actually risks in IoT?

IoT 355