Data Security

In Pod we trust: towards a transparent data economy
polypoly Cooperative publishes a technical white paper featuring its core technology, the polyPod. The cooperative is the first of its kind: A pan-European data cooperative in which shareholder-members own and profit from the underlying technology. Download now! Things are totally out of control. We don’t know who has our data,

Three VPN use cases you should know about
What is a VPN? How is it used? Why is it needed now more than ever before? Read on. Do you want to protect your online identity, stay safe on public wifi or bypass censorship on the internet? Then this article is for you. First a little background on how

How To Stop Data Breaches From Ruining Your Business
Data breaches are in the news all the time. It seems like you can’t go anywhere and swipe your credit card these days without receiving word your information may have been stolen. In typical data breaches where credit card info is stolen customers have a fair amount of protection through

“You can’t stop the device from getting hacked, you have to defend your data” – A Primer with Kevin Mahaffey
Kevin Mahaffey is an entrepreneur, investor and engineer with a background in cybersecurity, mobile and machine intelligence. He is CTO and Founder of Lookout, a cybersecurity company dedicated making the world more secure and trustworthy as it becomes more connected, starting with smartphones and tablets. He started building software when

Are Consumers Accepting Data Breaches as the New Normal?
Today, we’re more connected than ever thanks to the prevalence of smartphones in our lives, and their integration with Cloud services. This comes at a cost, however. With so much of our personal information online, data breaches are becoming more common. So what exactly is a data breach? In essence,

Winning the Cyber War?
The Cyber-Security War For those of you who don’t know yet, the world is currently engaged in a massive global technological war over access to everything stored online. On one side we have regular internet users (or targets), who consist of large corporations, governments, small businesses and consumers like us

Online Shoe Retailer Office Gets Slap on the Wrist from ICO following 2014 Customer Data Breach
Office, the UK based online shoe store has received a warning from the Information Commissioner’s Office (ICO) where the imposing of a fine or stricter measures were imminent, in the aftermath of a data breach that compromised customer information. Personal information such as contact details and website passwords of over

60 Seconds With Mark Cuban: Cyber Dust and Data Security
Mark Cuban is an American businessman, investor, tech mogul, and owner of the NBA’s Dallas Mavericks. He is also a “shark” investor on the hit television series Shark Tank, and creator of privacy focused messaging app ‘Cyber Dust’. After being falsely accused of insider trading by the SEC in 2008

Sony Cyber Attack Should Be Eye-Opener for Organisations, Warn Security Experts
Media giant Sony Pictures, is the latest to be victimized by a cyber attack that paralyzed its internal systems and leaked sensitive documents ranging from coming products to pay information, on the 24th of November . Having disrupted the internal machinery of the company, it has also triggered a frenzy

How Teachers Can Protect Their Data at School
We live in an increasingly connected world with more capabilities than ever before at our fingertips, and it’s making many jobs out there a lot more dynamic. Education is no exception to this trend, though teachers and administrators will likely use these online tools for much different purposes compared to