The agency doesn’t ask for explicit consent to collect the voiceprints; and, the…

Don’t expect tracking methods such as browser fingerprinting to disappear anytime soon, even…

Attackers use the approach to look like legitimate traffic and hide data exfiltration…

A new botnet from the Dark Web displays a never-before-seen level of complexity…

The threat actors appear to be in a reconnaissance phase, which could be…

This is the fourth and final glossary in the GDPR series. This glossary seeks to explain the roles and changes a company needs to introduce to be GDPR compliant following GDPR Enforcement. I felt there was a large introduction of roles necessary for company’s compliance which were not explained, and I did not understand.

Despite being widely available, uptake of multi-factor authentication has been slow and we…