Cybersecurity Hour: Exploring the Cybersecurity Canon
Subscribe
Sign in
Home
Cybersecurity Canon - Hall of…
Archive
About
Latest
Top
Cybersec Canon Ep 2. The Cuckoo’s Egg - Chapter 3 & 4. The Hidden Cost of Custom Software Ecosystems
Building proprietary software stacks instead of relying on open-source or commercially available solutions has many benefits but also hidden costs.
Oct 27
•
Rob, a bibliophile
Share this post
Cybersec Canon Ep 2. The Cuckoo’s Egg - Chapter 3 & 4. The Hidden Cost of Custom Software Ecosystems
cybersecurityhour.com
Copy link
Facebook
Email
Note
Other
Cybersec Canon Ep 1. The Cuckoo’s Egg - Chapter 1 & 2. When Debugging Uncovers More Than Bugs
Debugging a production issue is quite rewarding and engaging.
Oct 19
•
Rob, a bibliophile
Share this post
Cybersec Canon Ep 1. The Cuckoo’s Egg - Chapter 1 & 2. When Debugging Uncovers More Than Bugs
cybersecurityhour.com
Copy link
Facebook
Email
Note
Other
September 2023
Understanding Privacy-Enabling Technologies (PETs): More Than Just Digital Safeguards
PETs are a set of technologies that can be used to protect the privacy of individuals and also achieve compliance with data protection legislation and…
Sep 15, 2023
•
Rob, a bibliophile
Share this post
Understanding Privacy-Enabling Technologies (PETs): More Than Just Digital Safeguards
cybersecurityhour.com
Copy link
Facebook
Email
Note
Other
The EU-US Data Privacy Framework: A New Era for Transatlantic Data Transfers
The EU-US DPF replaces the previous Privacy Shield framework, which was invalidated in 2020. It provides businesses with a way to transfer personal data…
Sep 14, 2023
•
Rob, a bibliophile
Share this post
The EU-US Data Privacy Framework: A New Era for Transatlantic Data Transfers
cybersecurityhour.com
Copy link
Facebook
Email
Note
Other
Understanding the FTC's Mail, Internet, or Telephone Order Merchandise Rule
MOTSR is a rule enforced by the FTC that protects consumers who purchase merchandise by mail, phone, or Internet. It also applies to sellers who sell…
Sep 13, 2023
•
Rob, a bibliophile
Share this post
Understanding the FTC's Mail, Internet, or Telephone Order Merchandise Rule
cybersecurityhour.com
Copy link
Facebook
Email
Note
Other
Advancing Data Privacy: G20 Leaders' Commitment at the New Delhi Summit
The G20 leaders recently recommitted to collaboration on privacy matters. They acknowledged the importance of data flows for economic growth and…
Sep 12, 2023
•
Rob, a bibliophile
Share this post
Advancing Data Privacy: G20 Leaders' Commitment at the New Delhi Summit
cybersecurityhour.com
Copy link
Facebook
Email
Note
Other
Crafting a Comprehensive Privacy Policy: What to Include
A privacy policy is a document that explains how an organization collects, uses, and shares personal information about its customers, employees, or…
Sep 11, 2023
•
Rob, a bibliophile
Share this post
Crafting a Comprehensive Privacy Policy: What to Include
cybersecurityhour.com
Copy link
Facebook
Email
Note
Other
The Safe Harbor Agreement and Schrems I: A Turning Point in Data Privacy
Introduction
Sep 10, 2023
•
Rob, a bibliophile
Share this post
The Safe Harbor Agreement and Schrems I: A Turning Point in Data Privacy
cybersecurityhour.com
Copy link
Facebook
Email
Note
Other
Privacy by Design: Building Privacy into the Fabric of Technology
Privacy by Design (PbD) is a framework for building privacy into technology from the outset. It helps organizations to protect the privacy of their…
Sep 9, 2023
•
Rob, a bibliophile
Share this post
Privacy by Design: Building Privacy into the Fabric of Technology
cybersecurityhour.com
Copy link
Facebook
Email
Note
Other
Navigating Data Privacy with Generally Accepted Privacy Principles (GAPP)
GAPP serves as a guideline for organizations to effectively manage privacy risk and compliance.
Sep 8, 2023
•
Rob, a bibliophile
Share this post
Navigating Data Privacy with Generally Accepted Privacy Principles (GAPP)
cybersecurityhour.com
Copy link
Facebook
Email
Note
Other
Privacy Is Not Confidentiality, and Security Is Not Privacy
Privacy and security are often used interchangeably, but they are distinct concepts with overlaps and disconnects.
Sep 7, 2023
•
Rob, a bibliophile
Share this post
Privacy Is Not Confidentiality, and Security Is Not Privacy
cybersecurityhour.com
Copy link
Facebook
Email
Note
Other
Crime Prevention Through Environmental Design (CPTED): Building Safer Communities
CPTED, based on the idea that the physical environment can influence human behavior, is a security approach that uses environmental design to deter…
Sep 6, 2023
•
Rob, a bibliophile
Share this post
Crime Prevention Through Environmental Design (CPTED): Building Safer Communities
cybersecurityhour.com
Copy link
Facebook
Email
Note
Other
Share
Copy link
Facebook
Email
Note
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts