Featured article by Jonathan Liebenberg  Building for the web today requires navigating a seemingly endless forest of acronyms. API, CDN, AWS, CMS…the list goes on and on! It’s easy to get bogged down by the dizzying array of web development and marketing jargon. In...
The latest in Privacy
SOURCE: Axios The Federal Trade Commission on Thursday began an effort to regulate data privacy practices, the first major regulatory undertaking by FTC chair and Big Tech antagonist Lina Khan. Why it matters: The FTC rulemaking could lead to strict regulations on how...
SOURCE: Cloudwards We live in a day and age where it seems like every website we visit and every piece of software we use wants to know everything about us. Data collection is a major issue, whether that’s general information or more sensitive data. Nobody wants their...
By Peter R. Kelley Among the top ten presentations at Blackhat 2022 that news watchers are anticipating is new analysis from French deeptech cybersecurity company Quarkslab on the Titan M modern security chipset, a key component in Google Pixel 3-5 devices. The...
SOURCE: insideBIGDATA In an age in which data governance has become all but synonymous with data privacy and data protection, there are numerous aspects of data management that are regarded much differently than how they traditionally were. Data modeling, for example,...
SOURCE: TechTarget Data protection and safeguarding user privacy are both key to regulations such as the Health Insurance Portability and Accountability Act, the California Consumer Privacy Act, the General Data Protection Regulation and the Biometric Information...
Featured article by Sarah Shepard Over the last few years internet usage has continued to grow, as consumers become increasingly reliant on the internet for entertainment, communication and the purchasing of goods and services. This significant level of demand has...
Featured article by Jeff Broth Image: Unsplash Over the years, the cyber threat landscape has changed, and it's not for the better. Cyberattacks have become so complex and aggressive that it is becoming more difficult to combat them. According to the Allianz Risk...
Featured article by Uzair Nazeer Image by Domenico Loia on Unsplash Picking a topic that generates much interest, in this article, we are going to discuss optimizing web page response time using open source tools. Modern-day web applications are getting more...
Featured article by Uzair Nazeer Photo by Flex Point Security Inc. on Unsplash A large number of applications are currently being deployed, and each and every one of our tasks is now being digitized. But how can businesses deal with the security requirements of the...


