Differencing and Reconstruction Attacks

  • Post Author:
  • Post Category:Blog

Privacy attacks aim to reverse data privacy protection mechanisms such as generalization, aggregation or perturbation, to expose sensitive information about individuals in a dataset. Techniques used can target aggregate data like summary counts, histograms or average statistics. Mathematical breakthroughs, easy access to more powerful compute platforms, and widespread availability of large and varied public data sets have made these techniques a growing threat to the confidentiality of aggregate data releases.

(more…)

Continue Reading Differencing and Reconstruction Attacks

Data Breach Prevention: Insider Threats

  • Post Author:
  • Post Category:Blog

A data breach is a company’s or organization’s worst nightmare and has the potential to expose a significant amount of your business’, customers’ and employees’ confidential and private information. Additionally, a fine assessed for breach of GDPR could cripple your business. 

(more…)

Continue Reading Data Breach Prevention: Insider Threats
Anonymization: Easy to Claim, Hard to Achieve
Stopping the domino effect concept for business solution, strategy and successful intervention

Anonymization: Easy to Claim, Hard to Achieve

  • Post Author:
  • Post Category:Blog

The New York Times and the MIT Technology Review recently reported on a new study that points out the significant re-identifiability risk in sensitive personal data that has been anonymized.

(more…)

Continue Reading Anonymization: Easy to Claim, Hard to Achieve
The CCPA is coming: Businesses Face Both Risks and Opportunities
law legal technology concept. Wooden gavel on laptop keyboard with scales of justice in business city background. (law legal technology concept. Wooden gavel on laptop keyboard with scales of justice in business city background., ASCII, 114 components

The CCPA is coming: Businesses Face Both Risks and Opportunities

  • Post Author:
  • Post Category:Blog

The California Consumer Protection Act (CCPA) goes into effect Jan. 1, 2020 and many organizations are already working to ensure compliance. Wisely so. 

(more…)

Continue Reading The CCPA is coming: Businesses Face Both Risks and Opportunities
Singapore Government wisely rolls out new data privacy standards
Singapore, Singapore - September 5, 2016: View at the Marina Bay district in Singapore during the afternoon with the iconic landmarks of The Helix Bridge, The Marina Bay Sands and The ArtScience Museum.

Singapore Government wisely rolls out new data privacy standards

  • Post Author:
  • Post Category:Blog

Governments worldwide are under twin pressures ‘  not only to use their data to inform policies, make better decisions, and deliver improved public services for less, but also to meet the public’s expectation that they maintain the highest standards of data privacy and protection.

(more…)

Continue Reading Singapore Government wisely rolls out new data privacy standards

Building the complete privacy toolbox

  • Post Author:
  • Post Category:Blog

There are a huge range of tools and techniques available to help you protect your data ‘ but there’s no perfect tool that covers everything. To ensure a data breach doesn’t land your organisation on the front pages, you need a cohesive strategy.

(more…)

Continue Reading Building the complete privacy toolbox

Bridging the gap – ensuring visibility across the data pipeline

  • Post Author:
  • Post Category:Blog

Privacy isn’t just about the data itself. It’s about the whole data process ‘ what happens to the data before it’s delivered, and who accesses it afterwards. But these two parts of the process are often disconnected, and this means data isn’t traced throughout the entire data pipeline. At In:Confidence 2019, Privitar’s Lee Bonham showed us three ways to help bridge this gap in the pipeline.

(more…)

Continue Reading Bridging the gap – ensuring visibility across the data pipeline