MindPrivacy's profile picture. Data Science meets Data Protection - Managing data assets requires a clear view of data life cycles. We develop & support those data flows, preventing menaces.

Mind Your Privacy

@MindPrivacy

Data Science meets Data Protection - Managing data assets requires a clear view of data life cycles. We develop & support those data flows, preventing menaces.

Mind Your Privacy reposted

Outgoing Digital Commissioner: A lot more work is needed to clarify the ‘right to be forgotten’ @Euractiv euractiv.com/sections/infos…


Convocada la XVI Jornada Internacional de Seguridad de la Información de ISMS Forum Spain ow.ly/DBQeK via @pacoperezbes


RT @ENATIC1 Ayer: El Congreso aprueba la Ley que reforma la Ley de Propiedad Intelectual congreso.es/portal/page/po #LPI


RT @CSOspain Cómo gestionar con #seguridad los dispositivos móviles en el negocio #conocedell bit.ly/RetosTI


3 major mobile threats:Vulnerable devices, account takeover & cross-channel attacks #mobile securityintelligence.com/media/stay-one… @IBMSecurity


Find out @AureliePols performance at #eMetrics yesterday from London available! ow.ly/DBPi7 #Privacy #Databreach #Trust


RT @CarloPiltz German Federal Court asks ECJ if dynamic IP-address must be considered personal data ow.ly/DBO0o #EUDataP


Key lesson from #WhiteHouse breach: organizations should invest in intrusion detection tools databreachtoday.com/interviews/whi… @DataBreachToday


Brazilian Congressman Introduces Right to Be Forgotten Bill: huntonprivacyblog.com/2014/10/articl… #RTBF


Mind Your Privacy reposted

Check out our latest blog post! Women In Security & Privacy Event Packs TRUSTe Office - truste.com/blog/2014/10/2…


Mind Your Privacy reposted

Cybercriminals step up effort to use malware injected into ads online to attack consumers, take over home computers - ibm.co/1tDcZHI


Mind Your Privacy reposted

Mulligan: Must find balance btwn privacy as political and tactical; CPOs can't feel like aliens unwanted in the room; often do. #PrivacyAct


IBM permite adelantarse a los ciberataques con el software i2 Enterprise Insight Analysis cso.computerworld.es/contenido/9913… via @csospain


RT @ENATIC1 "La #ciberseguridad como bien jurídico protegido" José Mª Molina Mateos abogacia.es/2014/09/15/la-… Archivo #ENATICBlog


Loading...

Something went wrong.


Something went wrong.