apple privacy

Apple’s New Privacy Initiative

Apple’s tracking-optional iOS 14.5 update provides privacy-preserving features, giving users the ability to opt-out of being followed around the Internet via “trackers” in their apps. This privacy-driven iOS 14.5 update …

canada clearview ai

Canada Rules Clearview AI’s Illegal

Clearview AI has created one of the broadest and most powerful facial recognition databases in the world. Their application allows a user (law enforcement we hope) to upload a photo of …

common vulnerabilities exposures cve

Common Vulnerabilities and Exposures (CVE)

Common Vulnerabilities and Exposures (CVE) is a list of computer security flaws ranked on critical measures to aid individuals and companies with assessing the risk posed by the vulnerability or exposure …

data aggregation

Data Aggregation

The world of big data swirls around all of us online today. Data Aggregation (DA) is how big data is analyses for meaningful relationships and then converted into actionable intelligence. Learn more at CyberHoot.

tattoo recognition software

Social Media Used To Catch Violent Protester

Social media video was used to identify and apprehend a violent protester in Philidelphia. Our images and identity markers are being documented everywhere we go and our privacy is being bottled up in countless databases across the world, boiled down to a digital fingerprints, and used by law enforcement and others if the data is breached and stolen. Are the right protections in place to protect our 4th amendment rights? With great power comes great responsibility. It also requires great cybersecurity protection which CyberHoot is not convinced exists to keep these digital fingerprints safe and protected from misuse.

ccpa gdpr privacy act laws

Regulations Like the CCPA Don't Stop at California

Data Privacy legislation has received some heavy support from the European Union with the passing of the General Data Privacy Regulations (GDPR) followed by California’s Consumer Protection Act (CCPA). Additional states are looking to bring a patchwork quilt of privacy requirements to the US in concert and conflict with one another. Learn more here at CyberHoot.

Need to Know

Need to Know often gets applied to Classified Top Secret information. However, understanding how it applies could provide insights in how to better protect your SMB’s data and spot errors, omissions, and potentially malicious insiders.

Privacy

Privacy is the assurance that the confidentiality of, and access to, certain information about an entity is protected. In the cyber world, it is about the ability of individuals to …