Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Proxy Servers and Internet Privacy: Are You Really Anonymous?

In an age where every click, search, and online transaction can be tracked, the concept of internet privacy has become more relevant-and elusive-than ever. One popular tool in the fight for privacy is the proxy server. Marketed as a way to cloak your identity and guard your online activity, proxy servers promise anonymity in a world increasingly hungry for personal data. But the question remains: Are you really anonymous when using a proxy server?

Lattica Emerges from Stealth to Solve AI's Biggest Privacy Challenge with FHE

Lattica emerges from stealth with $3.25 million in pre-seed funding. The round was led by Konstantin Lomashuk's Cyber Fund, with participation from angel investor Sandeep Nailwal, co-founder of Polygon Network and Sentient: The Open AGI Foundation, among others.

Best Practices for Transitioning from Security to Privacy

As global privacy requirements evolve, many information security professionals are called upon to enhance or lead information privacy programs. While this transition may seem like a natural progression, I learned five important lessons when I moved from a focus on security and audit to the field of information privacy.

25 European Tech Companies Offering Private, Secure Services

Due to recent events happening worldwide, the US specifically, many people are looking for European tech companies to move away from big tech and switch to more private, secure solutions that value our data rather than profit from it. Moving away from any service can be challenging, and with companies like Google monopolizing the tech world, finding alternatives can seem almost impossible.

Introduction to the Australian Privacy Principles

The Privacy Act 1988 establishes the Australian Privacy Principles (APPs) as the foundation of privacy regulation in Australia. These 13 principles guide how organizations must handle, use, and manage personal information. The APPs apply to most Australian Government agencies, private organizations earning over $3 million annually, and certain smaller businesses—collectively called APP entities. For organizations doing business in Australia, APP compliance goes beyond avoiding penalties.

Bringing Data Privacy and Cyber Insurance Together with Bitsight

The cyber insurance industry continues to face challenges related to traditional cyber security risks, and more recently, data privacy risks. In many cases, traditional cyber insurance policies may cover legal fees or costs related to a data privacy infringement. Organizations not only get hit with class action lawsuits following incidents like breach of PII/PHI, but are seeing demand letters from law firms who are looking to protect their clients from any possible disclosure of their sensitive data.

An Introduction to Data Masking in Privacy Engineering

Protecting individual privacy is paramount, given the proliferation of Personally Identifiable Information (PII) and other sensitive data collected by enterprises across all industries. One way to protect sensitive data is through PII masking e.g., consistently changing names or including only the last four digits of a credit card or Social Security Number.

What Is Shoulder Surfing? Tips to Protect Your Personal Information

Not all threats to your accounts and privacy happen online. They can happen right next to you. The stranger sitting next to you on the metro, coffee shop, or airport may not be some innocent stranger. Instead, they could be looking for an opportunity and the right moment to look over your shoulder and steal your passwords or personal information. Shoulder surfing attacks happen when someone watches you enter sensitive information, such as a PIN or password, into your device or account.