Popular short-form video-sharing service TikTok is revising its privacy policy for European users to make it explicitly clear that user data can be accessed by some employees from across the world, including China. The ByteDance-owned platform, which currently stores European user data in the U.S. and Singapore, said the revision is part of its ongoing data governance efforts … [Read more...] about New TikTok Privacy Policy Confirms Chinese Staff Can Access European Users’ Data
Policy
TikTok Postpones Privacy Policy Update in Europe After Italy Warns of GDPR Breach
Popular video-sharing platform TikTok on Tuesday agreed to pause a controversial privacy policy update that could have allowed it to serve targeted ads based on users' activity on the social video platform without their permission to do so. The reversal, reported by TechCrunch, comes a day after the Italian data protection authority — the Garante per la Protezione dei Dati … [Read more...] about TikTok Postpones Privacy Policy Update in Europe After Italy Warns of GDPR Breach
Crafting a Custom Dictionary for Your Password Policy
Modern password policies are comprised of many different elements that contribute to its effectiveness. One of the components of an effective current password policy makes use of what is known as a custom dictionary that filters out certain words that are not allowed as passwords in the environment. Using custom dictionaries, organizations can significantly improve their … [Read more...] about Crafting a Custom Dictionary for Your Password Policy
GitHub Updates Policy to Remove Exploit Code When Used in Active Attacks
Code-hosting platform GitHub Friday officially announced a series of updates to the site's policies that delve into how the company deals with malware and exploit code uploaded to its service. "We explicitly permit dual-use security technologies and content related to research into vulnerabilities, malware, and exploits," the Microsoft-owned company said. "We understand that … [Read more...] about GitHub Updates Policy to Remove Exploit Code When Used in Active Attacks
Facebook Will Limit Your WhatsApp Features For Not Accepting Privacy Policy
WhatsApp on Friday disclosed that it won't deactivate accounts of users who don't accept its new privacy policy rolling out on May 15, adding it will continue to keep reminding them to accept the new terms. "No one will have their accounts deleted or lose functionality of WhatsApp on May 15 because of this update," the Facebook-owned messaging service said in a statement. The … [Read more...] about Facebook Will Limit Your WhatsApp Features For Not Accepting Privacy Policy
Visualize and validate policy, increase remote worker telemetry, and embrace zero trust with Network Analytics Release 7.3.1
We have heard it before. Securing your organization isn’t getting any easier. The remote workforce is expanding the attack surface. We need context from users and endpoints to control proper access, and IT teams need to ensure our data stores are resilient and always available to gain the telemetry they need to reduce risk. Yes, zero trust is a great approach, but network … [Read more...] about Visualize and validate policy, increase remote worker telemetry, and embrace zero trust with Network Analytics Release 7.3.1
WhatsApp Delays Controversial ‘Data-Sharing’ Privacy Policy Update By 3 Months
WhatsApp said on Friday that it wouldn't enforce its recently announced controversial data sharing policy update until May 15. Originally set to go into effect next month on February 8, the three-month delay comes following "a lot of misinformation" about a revision to its privacy policy that allows WhatsApp to share data with Facebook, sparking widespread concerns about the … [Read more...] about WhatsApp Delays Controversial ‘Data-Sharing’ Privacy Policy Update By 3 Months
Creating A Strong Password Policy With Specops and NIST Guidelines
End-user passwords are one of the weakest components of your overall security protocols. Most users tend to reuse passwords across work and personal accounts. They may also choose relatively weak passwords that satisfy company password policies but can be easily guessed or brute-forced. Your users may also inadvertently use breached passwords for their corporate account … [Read more...] about Creating A Strong Password Policy With Specops and NIST Guidelines
How to Use Password Length to Set Best Password Expiration Policy
One of the many features of an Active Directory Password Policy is the maximum password age. Traditional Active Directory environments have long using password aging as a means to bolster password security. Native password aging in the default Active Directory Password Policy is relatively limited in configuration settings. Let's take a look at a few best practices that have … [Read more...] about How to Use Password Length to Set Best Password Expiration Policy
Unify security policy across hybrid networks with Cisco Defense Orchestrator
Manage a consistent posture from your physical network to the cloud all from a single pane of glass Our Applications are rapidly changing, driven in large part by the rapid adoption of public cloud services. As such, public clouds have become critical extensions of our physical environments. They provide a level of flexibility and scalability that wasn’t possible previously. … [Read more...] about Unify security policy across hybrid networks with Cisco Defense Orchestrator