#data-and-governance

[ follow ]
Information security
fromHarvard Gazette
9 hours ago

Time for government, business leaders to figure out AI cybersecurity regulation - Harvard Gazette

Agentic AI poses both opportunities for cybersecurity and risks to personal data, economy, and national security, necessitating regulation by leaders.
Artificial intelligence
fromTechRepublic
15 hours ago

AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech - TechRepublic

AI innovation and security threats are reshaping technology and corporate strategies across various platforms and applications.
#privacy
fromAdExchanger
3 days ago
Privacy professionals

Cookies, Whether You Want Them Or Not; Feeding The 'Industry Plants' | AdExchanger

Privacy technologies
fromComputerWeekly.com
13 hours ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Privacy professionals
fromAdExchanger
3 days ago

Cookies, Whether You Want Them Or Not; Feeding The 'Industry Plants' | AdExchanger

Microsoft's cookie policies raise concerns about user privacy despite opting out of third-party data sharing.
EU data protection
fromwww.independent.co.uk
15 hours ago

What are EU digital identity wallets? The benefits and risks explained

The Independent provides accessible journalism on critical issues like reproductive rights and digital identity, emphasizing the importance of on-the-ground reporting.
Scala
fromInfoQ
17 hours ago

Lakehouse Tower of Babel: Handling Identifier Resolution Rules Across Database Engines

Open table formats standardize data semantics but lack SQL dialect interoperability, complicating identifier resolution across different engines.
Data science
fromMarTech
16 hours ago

Synthetic research is a promise with a catch | MarTech

Economic pressure for quick research results conflicts with the scientific demand for rigor, leading to potential biases in synthetic data outputs.
fromNextgov.com
7 hours ago

OMB's examination of Mythos is 'not giving access to anything to agencies,' official says

OMB is not giving access to anything to agencies, according to a spokesperson, despite the administration's interest in the powerful Mythos AI model that identifies digital vulnerabilities.
Washington DC
Marketing tech
fromExchangewire
1 day ago

Agentic Advertising Needs Interoperability, Standardisation and Adoption to Thrive

The ad industry is transitioning to agentic advertising, promising automation and efficiency but requiring careful planning to avoid potential pitfalls.
#data-breach
Information security
fromTheregister
1 day ago

McGraw Hill linked to 13.5M-record data leak

McGraw Hill experienced a data breach exposing 13.5 million records due to a Salesforce misconfiguration, leading to personal information circulating online.
Information security
fromSecuritymagazine
3 days ago

McGraw Hill Data Breach Caused by Salesforce Misconfiguration

McGraw Hill experienced a data breach linked to a Salesforce misconfiguration, with ShinyHunters claiming to have stolen 45 million records.
Information security
fromTheregister
1 day ago

McGraw Hill linked to 13.5M-record data leak

McGraw Hill experienced a data breach exposing 13.5 million records due to a Salesforce misconfiguration, leading to personal information circulating online.
Information security
fromSecuritymagazine
3 days ago

McGraw Hill Data Breach Caused by Salesforce Misconfiguration

McGraw Hill experienced a data breach linked to a Salesforce misconfiguration, with ShinyHunters claiming to have stolen 45 million records.
US news
fromwww.npr.org
20 hours ago

The Labor Department wants to teach you to use AI more. Here's what we found

AI literacy course aims to empower individuals by teaching practical AI skills to enhance personal and professional productivity.
Deliverability
fromMarTech
16 hours ago

A 15-minute AI workflow to clean campaign data | MarTech

Data hygiene is crucial for effective campaign personalization and segmentation, requiring a quick AI-assisted cleanup before launching.
DevOps
fromComputerWeekly.com
18 hours ago

AI, energy, and the new rules of cloud sustainability competition | Computer Weekly

Cloud providers offer sustainability metrics, but lack standardization makes it difficult for enterprises to compare workloads effectively.
Intellectual property law
fromFortune
12 hours ago

Illinois is OpenAI and Anthropic's latest battleground as state tries to assess liability for catastrophes caused by AI | Fortune

OpenAI and Anthropic support opposing AI bills in Illinois regarding liability for AI-related incidents.
SF politics
fromwww.businessinsider.com
1 day ago

Data center executives fret over the industry's increasingly toxic public image

The data center industry faces backlash over environmental and economic concerns, threatening major projects and requiring better public relations efforts.
Digital life
fromwww.dw.com
3 days ago

Dangerous Apps In the Web of Data Brokers

Smartphone apps collect detailed location data, often shared with data brokers, posing security risks to users, including soldiers and government officials.
World politics
fromenglish.elpais.com
1 day ago

Experts call for tighter controls on prediction markets: They pose underappreciated threats to democratic integrity'

Prediction markets raise ethical concerns and potential manipulation risks, prompting calls for stricter regulation to protect democratic integrity.
Healthcare
fromMedium
1 day ago

The trust gap in healthcare AI isn't about the AI

Trust in healthcare AI is established in the first 30 seconds of interaction, not through model improvements.
fromNature
4 days ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
#cybersecurity
Careers
fromSecurityWeek
2 days ago

CISO Conversations: Ross McKerchar, CISO at Sophos

Ross McKerchar transitioned from IT to cybersecurity, becoming CISO at Sophos, emphasizing leadership skills and the growing cybersecurity profession.
Information security
fromTechCrunch
11 hours ago

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Hackers exploited Windows vulnerabilities published by a researcher, affecting Windows Defender and allowing high-level access.
Information security
fromNextgov.com
2 days ago

Expect more cybersecurity executive orders soon, national cyber director says

President Trump is expected to sign more cybersecurity executive orders soon, following the release of the national cyber strategy.
Careers
fromSecurityWeek
2 days ago

CISO Conversations: Ross McKerchar, CISO at Sophos

Ross McKerchar transitioned from IT to cybersecurity, becoming CISO at Sophos, emphasizing leadership skills and the growing cybersecurity profession.
Information security
fromTechCrunch
11 hours ago

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Hackers exploited Windows vulnerabilities published by a researcher, affecting Windows Defender and allowing high-level access.
Information security
fromNextgov.com
2 days ago

Expect more cybersecurity executive orders soon, national cyber director says

President Trump is expected to sign more cybersecurity executive orders soon, following the release of the national cyber strategy.
#digital-sovereignty
Europe politics
fromTheregister
4 days ago

Digital sovereignty isn't just a buzzword - it's the future

European governments and companies are prioritizing digital sovereignty due to concerns over US control and dependency.
DevOps
fromFortune
1 week ago

The digital sovereignty dilemma is a false choice - here's how enterprises can have both | Fortune

Organizations must ensure digital sovereignty by balancing local control with global technology access to remain resilient and competitive.
Europe politics
fromTheregister
4 days ago

Digital sovereignty isn't just a buzzword - it's the future

European governments and companies are prioritizing digital sovereignty due to concerns over US control and dependency.
DevOps
fromFortune
1 week ago

The digital sovereignty dilemma is a false choice - here's how enterprises can have both | Fortune

Organizations must ensure digital sovereignty by balancing local control with global technology access to remain resilient and competitive.
London startup
fromComputerWeekly.com
4 days ago

Datacentre developers tout benefits to local communities, but do they deliver? | Computer Weekly

Datacentre developments are causing challenges for local businesses, raising concerns about energy consumption and community impact despite potential local benefits.
Artificial intelligence
fromThe Verge
9 hours ago

Anthropic's new cybersecurity model could get it back in the government's good graces

Anthropic's relationship with the Trump administration has improved due to its new cybersecurity model, Claude Mythos Preview.
#age-verification
fromAbove the Law
15 hours ago
Privacy technologies

438 Experts Said Age Verification Is Dangerous. Legislators Are Moving Forward With It Anyway. - Above the Law

Age verification mandates for the internet are technically flawed, threaten privacy, and may cause more harm than good, according to 438 researchers from 32 countries.
Privacy technologies
fromThe Verge
1 day ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
Privacy technologies
fromAbove the Law
15 hours ago

438 Experts Said Age Verification Is Dangerous. Legislators Are Moving Forward With It Anyway. - Above the Law

Age verification mandates for the internet are technically flawed, threaten privacy, and may cause more harm than good, according to 438 researchers from 32 countries.
Privacy technologies
fromThe Verge
1 day ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
Marketing tech
fromMarTech
16 hours ago

Reclaiming the power of the story - fueled by data and AI | MarTech

Marketing teams can enhance storytelling and authenticity by integrating AI without sacrificing human connection.
DevOps
fromInfoWorld
19 hours ago

When cloud giants neglect resilience

Cloud outages highlight reliability issues as providers prioritize cost-cutting over service stability, raising questions about acceptable levels of unreliability.
EU data protection
fromComputerWeekly.com
1 day ago

CYBERUK '26: UK lagging on legal protections for cyber pros | Computer Weekly

The outdated Computer Misuse Act hinders UK cyber security innovation and needs urgent reform to protect cyber professionals.
Privacy professionals
fromGeeky Gadgets
21 hours ago

Why ChatGPT is Suddenly Collecting 70% More of Your Personal Data

Data collection by AI chatbots has surged, raising significant privacy concerns as 70% now gather user location data, up from 40% last year.
fromSecurityWeek
19 hours ago

Lawmakers Gathered Quietly to Talk About AI. Angst and Fears of 'Destruction' Followed

"People in our districts across this country are going to start feeling impacts very soon, and if we don't start thinking properly and aggressively and proactively about the challenges that AI creates, I fear that we're going to have a revolution on our hands," said Rep. Dave Min, D-Calif.
SF politics
Software development
fromZDNET
2 days ago

'Like handing out the blueprint to a bank vault': Why AI led one company to abandon open source

Cal is shifting from open source to proprietary licensing due to security risks posed by modern AI tools.
Non-profit organizations
fromNextgov.com
1 week ago

The war against fraud should be a war for tech modernization

A new task force aims to combat fraud in public benefits programs by ensuring adequate anti-fraud controls and addressing data sharing challenges.
Information security
fromTechRepublic
1 day ago

McGraw-Hill Confirms Data Exposure, Hackers Claim 45M Salesforce Records Leaked

Unauthorized access to limited internal data at McGraw-Hill was linked to a Salesforce misconfiguration, raising concerns about potential identity fraud and harassment.
DevOps
fromInfoQ
1 day ago

AWS Launches Agent Registry in Preview to Govern AI Agent Sprawl Across Enterprises

AWS Agent Registry provides a centralized catalog for managing AI agents, tools, and skills across organizations, addressing agent sprawl and compliance issues.
Privacy professionals
fromExtremeTech
1 day ago

Google, Microsoft, and Meta Ignore Your Ad Tracking Opt-Outs, Audit Reveals

Google, Microsoft, and Meta track users' browsing habits despite opt-out requests, violating privacy regulations.
Marketing tech
fromThe Drum
23 hours ago

Future-proofing your advertising strategy for a cookie-free climate

Advertisers in APAC must develop addressability strategies before third-party cookies are deprecated to maintain targeting and measurement capabilities.
#ai-governance
fromFortune
13 hours ago
Artificial intelligence

AI cybersecurity capabilities require urgent international cooperation, AI godfather Bengio says | Fortune

fromAbove the Law
1 day ago
Artificial intelligence

Unintentional AI Adoption Is Already Inside Your Company. The Only Question Is Whether You Know It. - Above the Law

Artificial intelligence
fromFortune
13 hours ago

AI cybersecurity capabilities require urgent international cooperation, AI godfather Bengio says | Fortune

Yoshua Bengio emphasizes the urgent need for international cooperation in addressing AI's risks, particularly with the release of Anthropic's Mythos model.
Artificial intelligence
fromAbove the Law
1 day ago

Unintentional AI Adoption Is Already Inside Your Company. The Only Question Is Whether You Know It. - Above the Law

AI is already integrated into companies through employee usage, often without intentional governance or awareness.
#identity-verification
DevOps
fromSecuritymagazine
2 days ago

Democratized Software, Democratized Risk: Who's Accountable When Everyone Codes?

AI-driven coding tools enable non-technical teams to create software, but they introduce vulnerabilities and require clear ownership and governance.
Privacy professionals
fromWIRED
1 day ago

Congress Turns Up Pressure on DHS Over Palantir's Role in Immigration Crackdown

Members of Congress demand DHS and ICE disclose details on surveillance tools used in immigration enforcement.
Marketing tech
fromAdExchanger
4 days ago

AI Is Nothing Without Data Fidelity. Here's A Four-Step Approach to Protect It | AdExchanger

Data integrity is crucial for effective AI in advertising, as flawed data leads to poor outcomes.
Data science
fromTheregister
1 week ago

UK National Data Library plan needs work, study finds

The UK's National Data Library needs improved dataset accessibility to support AI development and meaningful analysis.
DevOps
fromInfoWorld
1 day ago

The agent tier: Rethinking runtime architecture for context-driven enterprise workflows

Digital workflows in large enterprises struggle to adapt to contextual variations, leading to increased complexity and challenges in customer onboarding processes.
Privacy professionals
from404 Media
3 days ago

Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit

Microsoft, Meta, and Google may be violating California privacy laws by failing to honor user opt-out requests for ad cookies.
Marketing tech
fromExchangewire
3 days ago

Rewriting the Rules of Ad Tech: Intent-Driven Discovery, Meaningful Human Connections, and Transparency

AI and privacy are pivotal forces reshaping the ad tech industry in 2026.
EU data protection
fromTNW | Eu
1 day ago

The EU has told Google what it must do to share search data with rivals

The European Commission proposed measures for Google to share search data with competitors and AI chatbots under the Digital Markets Act.
Marketing tech
fromAcast
1 week ago

AI Governance Isn't a Barrier: It's Marketing's Growth Engine | Adspeak

AI is transforming marketing by enabling innovation through governance, clean data, and balancing automation with human creativity.
fromTheregister
2 days ago

Autovista blames ransomware for service disruption

"We know that getting this resolved quickly is important to you. Our top priority is to securely restore impacted applications, although we do not have a firm timeline on this yet."
EU data protection
#data-privacy
Privacy professionals
fromZDNET
3 days ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
Privacy professionals
fromZDNET
3 days ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
#ai
Artificial intelligence
fromTheregister
1 day ago

Make bad moves on AI and face voter backlash, govts warned

The UK government must demonstrate AI benefits to the public to mitigate backlash and concerns over job losses and risks associated with the technology.
Information security
fromTechzine Global
4 days ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Artificial intelligence
fromTheregister
1 day ago

Make bad moves on AI and face voter backlash, govts warned

The UK government must demonstrate AI benefits to the public to mitigate backlash and concerns over job losses and risks associated with the technology.
Information security
fromTechzine Global
4 days ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Privacy technologies
fromThe Verge
2 days ago

Microsoft faces fresh Windows Recall security concerns

A new tool, TotalRecall Reloaded, extracts data from Microsoft's redesigned Recall feature, raising ongoing security and privacy concerns.
#ai-security
Privacy professionals
fromwww.bbc.com
3 days ago

Palantir defends its record as MPs demand more scrutiny of data use

Palantir defends its NHS data contracts amid scrutiny, emphasizing its role in integrating fragmented healthcare systems and ensuring data security.
Information security
fromComputerWeekly.com
1 day ago

Cyber Essentials closes the MFA loophole but leaves some organisations adrift | Computer Weekly

Multi-factor authentication becomes mandatory under Cyber Essentials v3.3, with no exceptions for organizations failing to implement it.
Privacy professionals
fromRoute Fifty
4 days ago

Getting privacy policy right in a competitive digital economy

State and local leaders aim to balance privacy protection with economic competitiveness, as inconsistent privacy laws can hinder business operations and consumer trust.
#iam
Information security
fromInfoWorld
3 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromComputerworld
3 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromInfoWorld
3 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromComputerworld
3 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Privacy professionals
fromMedCity News
1 month ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
fromDbmaestro
4 years ago

5 Pillars of Database Compliance Automation |

There is a growing emphasis on database compliance today due to the stricter enforcement of compliance rules and regulations to safeguard user privacy. For example, GDPR fines can reach £17.5 million or 4% of annual global turnover (the higher of the two applies). Besides the direct monetary implications, companies also need to prioritize compliance to protect their brand reputation and achieve growth.
EU data protection
Information security
fromBusiness Matters
1 month ago

7 Data Privacy Risks Leaders Miss in 2026

Organizations overlook seven critical privacy risks in 2026 that bypass security awareness, including public WiFi interception, malicious browser extensions, shadow AI tools, unencrypted messaging, credential reuse, unmanaged personal devices, and data retention gaps.
fromComputerWeekly.com
2 months ago

AI slop pushes data governance towards zero-trust models | Computer Weekly

Unverified and low quality data generated by artificial intelligence (AI) models - often known as AI slop - is forcing more security leaders to look to zero-trust models for data governance, with 50% of organisations likely to start adopting such policies by 2028, according to Gartner's seers. Currently, large language models (LLMs) are typically trained on data scraped - with or without permission - from the world wide web and other sources including books, research papers, and code repositories.
Artificial intelligence
[ Load more ]