Data Privacy

Your medical records are about to be given away. As GPs, we’re fighting back

Your medical records are about to be given away. As GPs, we’re fighting back
GPs in England have been told to hand over all patient data to NHS Digital – potentially to be exploited for corporate profit. GP practices in England have been instructed to hand over their patients’ entire medical histories with just six weeks’ notice. Like many GPs, I’m very concerned about the implications this has for my patients. A growing number of us in London have taken taken the decision to pull the plug on the new data-sharing programme with NHS Digital and refuse to hand over patient records.
Read More

How to opt out of (or into) Amazon’s Sidewalk network

How to opt out of (or into) Amazon’s Sidewalk network
Do you own an Echo Studio, an Echo Dot, or a Ring Floodlight Cam? If so, Amazon is about to introduce your device to a new type of network it calls Sidewalk, which is meant to help extend the range of its low-bandwidth devices (so that if your network goes down, for example, your Dot can piggyback on your neighbors’), and also to make location devices such as Tile more efficient.
Read More

Trust and Data Analytics: Protecting Privacy in Analysis

Trust and Data Analytics: Protecting Privacy in Analysis
Technology gave rise to Data Analytics, but it can also become the cause of several privacy issues. Data Analytics is progressively changing the world. Businesses, governments, and different organizations are unlocking their true potential with the help of Data Analytics. Real-time analytics provides swift solutions to complex problems, enabling faster decision-making, and accelerating investments across all industrial sectors.
Read More

How Privacy-Enhancing Technologies Can Accelerate Your Data Strategy

How Privacy-Enhancing Technologies Can Accelerate Your Data Strategy
As organizations look to safely and securely connect with their partners, executive decision makers are increasingly finding that their strategic discussions on data collaboration need to include privacy-enhancing technologies (PETs). PETs offer businesses the ability to accelerate safe data collaboration, build customer intelligence, and maximize the value of data without relinquishing control or compromising consumer privacy.
Read More

Data anonymization layer using Snowflake and DBT

Data anonymization layer using Snowflake and DBT
A scalable approach to anonymizing your data on Snowflake using DBTHousingAnywhere is an online marketplace platform for mid to long-term rents. Like any other data-driven business we have to deal with both personal information and GDPR regulations. In this brief article, I’ll walk you through our solution to anonymize PII (Personal Identifiable Information). The technologies that I’ll be using are Snowflake[1], a popular data warehouse cloud solution and DBT[2](Data Build Tool) a data transformation tool.
Read More

What are the different roles within cybersecurity?

What are the different roles within cybersecurity?
People talk about the cybersecurity job market like it's a monolith, but there are a number of different roles within cybersecurity, depending not only on your skill level and experience but on what you like to do. In fact, Cybercrime Magazine came up with a list of 50 cybersecurity job titles, while CyberSN, a recruiting organization, came up with its own list of 45 cybersecurity job categories
Read More

Who’s Watching Us? Why Privacy Matters. | Aishwarya Rambhatla | TEDxTSIS

Who’s Watching Us? Why Privacy Matters. | Aishwarya Rambhatla | TEDxTSIS
After attending the Global summit on Data privacy just a few months ago, Aiswarya found that there was much more to privacy policies than meets the eye. Her speech outlines what corporations truly do with our intellectual property whilst debunking common myths surrounding privacy in general. Year 12 Student at South Island School. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedxFrom: TEDx Talks
Read More

How the Work-From-Home Shift Impacts SaaS Security

How the Work-From-Home Shift Impacts SaaS Security
The data is in. According to IBM Security's 2020 Cost of a Data Breach Report, there is a 50% increase in cloud usage for enterprises across all industries. The number of threats targeting cloud services, predominantly collaboration services like Office 365, has increased 630%. Moreover, 75% of respondents report that discovery and recovery time from data breaches has significantly increased due
Read More

Gartner Top Security and Risk Trends for 2021

Gartner Top Security and Risk Trends for 2021
As cybersecurity and regulatory compliance become the top two biggest concerns of corporate boards, some are adding cybersecurity experts specifically to scrutinize security and risk issues.  Adding a cybersecurity expert directly to the board is just one of the eight Gartner security and risk trends for 2021, many of which are driven by recent events such as security breaches and the COVID-19 pandemic.
Read More

Google Reveals What Personal Data Chrome and Its Apps Collect On You

Google Reveals What Personal Data Chrome and Its Apps Collect On You
Privacy-focused search engine DuckDuckGo called out rival Google for "spying" on users after the search giant updated its flagship app to spell out the exact kinds of information it collects for personalization and marketing purposes. "After months of stalling, Google finally revealed how much personal data they collect in Chrome and the Google app. No wonder they wanted to hide it," the company
Read More

Bug in Apple’s Find My Feature Could’ve Exposed Users’ Location Histories

Cybersecurity researchers on Thursday disclosed two distinct design and implementation flaws in Apple's crowdsourced Bluetooth location tracking system that can lead to a location correlation attack and unauthorized access to the location history of the past seven days, thereby by deanonymizing users. The findings are a consequence of an exhaustive review undertaken by the Open Wireless Link (
Read More

Google Will Use ‘FLoC’ for Ad Targeting Once 3rd-Party Cookies Are Dead

Google Will Use ‘FLoC’ for Ad Targeting Once 3rd-Party Cookies Are Dead
Signaling a major shift to its ads-driven business model, Google on Wednesday unequivocally stated it would not build alternate identifiers or tools to track users across multiple websites once it begins phasing out third-party tracking cookies from its Chrome browser by early 2022. "Instead, our web products will be powered by privacy-preserving APIs which prevent individual tracking while
Read More

Brave is developing its own privacy-focused search engine

Privacy-focused browser Brave is working on its own search engine. It has bought Tailcat, an open-source engine created by a team who worked on the defunct anti-tracking browser and search engine Cliqz, to power Brave Search. The company will allow others to use Brave Search tech to build their own search engines.
Read More

The Difficulty of Graph Anonymisation

The Difficulty of Graph Anonymisation
Lessons from network science and the difficulty of graph anonymization. A data scientist's take on the difficultly of striking a balance between privacy and utility in anonymizing connected data.
Read More