The Latest in IT Security

Posts Tagged ‘policy’

Even a small modification might be a change you don’t like, such as a shift from “we won’t share your data with anyone else” to “now we’ve been acquired, we will allow our new parent company to use some of your personal data for other businesses in the group.” And it is difficult to compare […]

Read more ...

Uber Technologies is set to tweak its #privacy #policy so it can access a rider’s location when the Uber app is running in the background. The change in policy will also allow it to send special offers to users’ friends and family. Users will be in control in either case, and will be able to choose […]

Read more ...

#attribution is the hottest word in #digital security. The term refers to identifying responsibility for an incident. What does it matter, though? Here are five reasons, derived from the five levels of strategic thought. I’ve covered those before, namely in The Limits of Tool- and Tactics-Centric Thinking. Note that the reasons I outline here are not […]

Read more ...


Categories

THURSDAY, MAY 09, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments