Many software developers rely on error-prone manual scripts to handle privacy requests. Pelton, a new kind of database developed by researchers at Brown, provides correct …
Technology brought incredible convenience to nearly every aspect of our lives. Means of communication, transportation, entertainment, and even exercise is very different. Innovation came with, …
To remain both competitive and compliant, organizations need consistent approaches for how to understand and consume data, what to collect, and how to manage it. …
Anonymous credentials allow a user to prove possession of a set of credentials, issued by some trusted issuer or issuers, authorizing access to a resource. …
In the modern digital society, individuals, businesses and governments perform numerous everyday tasks such as shopping, banking and commuting using electronic media. Although these electronic …
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since …
This paper explores several use cases where human microchipping is enabling humans and businesses to interact with their digital surroundings faster and more efficiently in …
This paper presents the findings of unprecedented field research in social engineering and information security awareness training. A cross section of private companies and government …
Small and medium businesses (SMB) comprise approximately 99% of the economy in most developed countries. Because they represent the lion’s share of the economy, their …
The origins of the privacy profession as primarily a legal and compliance discipline has clearly changed, and while the arm of privacy professionals who are …
Apps provide valuable utility and customizability to a range of user devices, but installation of third-party apps also presents significant security risks. Many app systems …
The downside of the world becoming more digitally connected is that it is now easier for powerful adversaries to strongly discourage digital communications by conducting …
This paper examines at common machine learning applications in the physical security environment which collect data and what that means in light of GDPR by …
Data has changed how we do business. To keep pace, Privacy Offices are quickly turning to technological solutions to modernize and automate their existing operations. …