#registries

[ follow ]
#privacy
Privacy professionals
fromSecuritymagazine
8 hours ago

The Privacy-Security Partnership: How We Bend Risk in a Resource Crunch

Fewer privacy practitioners feel confident in meeting laws, while resource shortages and compliance challenges increase stress in the field.
Privacy technologies
fromComputerWeekly.com
4 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
#cybersecurity
fromLondon Business News | Londonlovesbusiness.com
4 days ago
Information security

The rising cost of data breaches: Why backup and cyber protection must go hand in hand - London Business News | Londonlovesbusiness.com

Cyber incidents now lead to significant financial and reputational damage, necessitating a unified strategy for backup and cyber protection.
fromSecuritymagazine
3 weeks ago
Privacy professionals

10 Data Security Stories to Know About (March 2026)

March saw significant data security incidents including cyberattacks, data purchases by the FBI, and breaches affecting millions of customers.
DevOps
fromSecuritymagazine
8 hours ago

The Security Metric That's Failing You

Measuring patch rates does not equate to a secure environment; real risks often lie in misconfigurations and outdated permissions.
Data science
fromInfoWorld
23 hours ago

Addressing the challenges of unstructured data governance for AI

Enterprises must enhance data governance for unstructured data as AI transforms data management practices.
#data-privacy
EU data protection
fromThedrum
1 day ago

The future of data, privacy and ethics

Misleading practices in e-commerce, such as false stock availability, are regulated by the European Commission to protect consumers.
Privacy professionals
fromZDNET
1 day ago

I tried to wipe my digital footprint without paying for a data removal service - 5 free ways

Most sensitive information online is legally collected and aggregated by brokers, but removal is possible with effort and available tools.
EU data protection
fromThedrum
1 day ago

The future of data, privacy and ethics

Misleading practices in e-commerce, such as false stock availability, are regulated by the European Commission to protect consumers.
Privacy professionals
fromZDNET
1 day ago

I tried to wipe my digital footprint without paying for a data removal service - 5 free ways

Most sensitive information online is legally collected and aggregated by brokers, but removal is possible with effort and available tools.
Digital life
fromFinbold
1 day ago

Why You Don't Actually Own The Money You Own

You do not truly own your bank balance; banks control access to your money, making you an unsecured creditor.
Artificial intelligence
fromTechRepublic
1 day ago

The MCP Disclosure Is the AI Era's 'Open Redirect' Moment

The Model Context Protocol has a design flaw that enables AI supply chain attacks, posing a significant security risk to enterprise AI systems.
Fundraising
fromIndependent
1 day ago

Company has more than 2m stolen from account following cyber attack

Future Energy Capital Limited lost over €2m due to a cyber attack last October.
#digital-identity
UK politics
fromComputerWeekly.com
2 days ago

Don't debate digital ID, trial it - the Isle of Wight could settle the argument | Computer Weekly

Digital identity can modernize public services, but requires real-world testing to avoid past failures and ensure effectiveness.
UK politics
fromComputerWeekly.com
2 days ago

Don't debate digital ID, trial it - the Isle of Wight could settle the argument | Computer Weekly

Digital identity can modernize public services, but requires real-world testing to avoid past failures and ensure effectiveness.
fromwww.housingwire.com
4 days ago

Disconnected systems fueling title, wire fraud risks

Disconnected systems, inconsistent definitions of data, and the manual nature of data movement create ongoing challenges in the title industry, according to FundingShield President Adam Chaudhary.
Real estate
Cryptocurrency
fromnews.bitcoin.com
3 days ago

This Week in Crypto Law (Apr. 12, 2026)

This week in crypto law showed a shift from experimentation to integration with federal authority reinforced and traditional finance deepening digital asset involvement.
fromNature
1 week ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
Wearables
fromEngadget
4 days ago

Sam Altman's 'human verification' company thinks its eye-scanning orbs could solve ticket scalping

Concert Kit uses World ID to help artists combat ticket scalping by verifying real human buyers.
DevOps
fromwww.bankingdive.com
2 days ago

How proactive DEX strengthens IT compliance in financial services

Proactive DEX management helps financial services organizations address compliance challenges by continuously monitoring and improving the digital workplace.
Europe politics
fromTheregister
1 week ago

Digital sovereignty isn't just a buzzword - it's the future

European governments and companies are prioritizing digital sovereignty due to concerns over US control and dependency.
fromThe New Yorker
1 day ago

When Your Digital Life Vanishes

A broken phone or corrupted drive can mean the loss of work, evidence, art, or the last traces of the dead. But sometimes data-recovery experts can summon lost files from the void.
Digital life
#cryptocurrency
Cryptocurrency
fromnews.bitcoin.com
2 days ago

Bitcoin Rebounds, But Crypto's Security Crisis Intensifies Week in Review

Bitcoin and major cryptocurrencies rose, indicating risk appetite despite ongoing geopolitical and economic uncertainties.
fromnews.bitcoin.com
2 weeks ago
Cryptocurrency

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

Bitcoin Rebounds, But Crypto's Security Crisis Intensifies Week in Review

Bitcoin and major cryptocurrencies rose, indicating risk appetite despite ongoing geopolitical and economic uncertainties.
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
EU data protection
fromwww.independent.co.uk
4 days ago

What are EU digital identity wallets? The benefits and risks explained

The Independent provides accessible journalism on critical issues like reproductive rights and digital identity, emphasizing the importance of on-the-ground reporting.
Artificial intelligence
fromTechRepublic
4 days ago

AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech - TechRepublic

AI innovation and security threats are reshaping technology and corporate strategies across various platforms and applications.
Real estate
fromwww.housingwire.com
5 days ago

When listings lie: AI staging pushes real estate into an ethics gray zone

The true picture standard in real estate requires accurate representation in advertising and marketing, impacting buyer perceptions and legal claims.
Information security
fromBusiness Matters
5 days ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
Cryptocurrency
fromBitcoin Magazine
4 days ago

When Quantum Computers Come For Your Bitcoin: What Classical Property Law Says Happens Next

Bitcoin's future is challenged by quantum computing, raising questions about ownership and legality of coins accessed through quantum-derived keys.
#agentic-ai
Information security
fromHarvard Gazette
4 days ago

Time for government, business leaders to figure out AI cybersecurity regulation - Harvard Gazette

Agentic AI poses both opportunities for cybersecurity and risks to personal data, economy, and national security, necessitating regulation by leaders.
Information security
fromHarvard Gazette
4 days ago

Time for government, business leaders to figure out AI cybersecurity regulation - Harvard Gazette

Agentic AI poses both opportunities for cybersecurity and risks to personal data, economy, and national security, necessitating regulation by leaders.
Artificial intelligence
fromTheregister
1 month ago

World pitch: scan eyeballs to tie identity to AI agents

World is launching AgentKit, a technology linking AI agents to verified human identities through iris-scanning orbs to prevent AI abuse and establish trust in agentic systems.
#age-verification
fromAbove the Law
4 days ago
Privacy technologies

438 Experts Said Age Verification Is Dangerous. Legislators Are Moving Forward With It Anyway. - Above the Law

Privacy technologies
fromThe Verge
5 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
EU data protection
fromWIRED
5 days ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
fromTNW | Government-Policy
6 days ago
Privacy technologies

The EU says its age verification app is ready

The European Commission's age verification app uses zero-knowledge proof technology to confirm user age without exposing personal data.
Privacy technologies
fromAbove the Law
4 days ago

438 Experts Said Age Verification Is Dangerous. Legislators Are Moving Forward With It Anyway. - Above the Law

Age verification mandates for the internet are technically flawed, threaten privacy, and may cause more harm than good, according to 438 researchers from 32 countries.
Privacy technologies
fromThe Verge
5 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
EU data protection
fromWIRED
5 days ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
EU data protection
fromnews.bitcoin.com
5 days ago

MiCA Decoded: Your Crypto White Paper Can't Just Be a Gitbook or PDF

A MiCA white paper is a formal regulatory document, not a marketing tool, with strict compliance requirements for crypto-assets in the EU.
Digital life
fromwww.dw.com
1 week ago

Dangerous Apps In the Web of Data Brokers

Smartphone apps collect detailed location data, often shared with data brokers, posing security risks to users, including soldiers and government officials.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

Less Than 1% of Crypto Projects Disclose Market Maker Deals

91% of crypto protocols generate revenue, but less than 1% disclose market maker deals, highlighting transparency issues and risks for investors.
EU data protection
fromSecurityWeek
5 days ago

53 DDoS Domains Taken Down by Law Enforcement

Law enforcement in 21 countries coordinated to disrupt DDoS-for-hire services, resulting in arrests and the takedown of numerous domains.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

Tempo Launches Private Stablecoin Zones for Enterprise Payroll and Treasury Settlements

Tempo launched Zones, a private execution environment for stablecoin transactions, ensuring transaction-level privacy for enterprises.
Marketing tech
fromwww.housingwire.com
3 weeks ago

The 'end-to-end' title tech system has given way to something better

Title agencies benefit from specialized tools and open systems rather than all-in-one platforms due to diverse regulatory and workflow needs.
#ai-governance
fromComputerWeekly.com
2 weeks ago
EU data protection

AI-driven identity must exist in a robust compliance framework | Computer Weekly

Governance must precede AI adoption to avoid compliance failures and ethical risks in identity verification systems.
#identity-verification
#blockchain
Cryptocurrency
fromFortune
4 days ago

Meet the crypto guru to the Fortune 500 | Fortune

CFOs are hesitant to adopt blockchain despite its existing infrastructure and Fortune 500 companies experimenting with it.
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

REAL and Redstone Collaborate to Enhance Data Integrity for Tokenized Assets

REAL partners with Redstone to enhance data transparency and risk intelligence in its ecosystem for tokenized assets.
Cryptocurrency
fromFortune
4 days ago

Meet the crypto guru to the Fortune 500 | Fortune

CFOs are hesitant to adopt blockchain despite its existing infrastructure and Fortune 500 companies experimenting with it.
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

REAL and Redstone Collaborate to Enhance Data Integrity for Tokenized Assets

REAL partners with Redstone to enhance data transparency and risk intelligence in its ecosystem for tokenized assets.
Privacy technologies
fromnews.bitcoin.com
5 days ago

Anthropic Adds ID Verification to Claude for Select AI Users

Anthropic implemented ID checks for Claude users in April 2026 to limit abuse and meet legal obligations, while not storing ID images on its systems.
#data-breach
Privacy professionals
fromSilicon Canals
2 weeks ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy professionals
fromSilicon Canals
2 weeks ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
Privacy professionals
fromSilicon Canals
2 weeks ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy professionals
fromSilicon Canals
2 weeks ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
Privacy professionals
fromZDNET
2 weeks ago

I turned to PrivacyBee to clean up my data - here's how it made me disappear

PrivacyBee is preferred for its comprehensive data removal services and user-friendly management tools.
fromwww.housingwire.com
3 weeks ago

MISMO publishes ALTA title and settlement datasets for review

The new standards allow title and settlement information to move as digital data rather than paper documents, improving accuracy and reducing manual workloads.
Real estate
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

Circle Announces Quantum-Resistant Roadmap to Secure Future Digital Asset Infrastructure

Circle's Arc platform will launch with post-quantum signature support to secure institutional assets against quantum threats.
Privacy technologies
fromComputerWeekly.com
2 weeks ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
fromMedium
1 month ago

Real-Time Data Validation in Healthcare Streaming: Building Custom Schema Registry Patterns with...

In a single streaming pipeline, you might be processing HL7 FHIR messages with frequent specification updates, claims data following various payer-specific formats, provider directory information with inconsistent taxonomies, and patient demographics with privacy redaction requirements. Our member eligibility stream processes roughly 50,000 records per minute during peak enrollment periods.
Healthcare
Real estate
fromwww.housingwire.com
1 month ago

Propy expands AI title rollup with Florida acquisition

Propy acquires Boss Law to expand institutional real estate services using AI and blockchain technology for faster closings and title operations.
Privacy professionals
fromMedCity News
1 month ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
fromEntrepreneur
1 month ago

Why Nations Are Now Battling Over Your Digital DNA

Across the world, governments are redefining data. It is no longer a commercial byproduct, but a strategic resource. One that carries economic weight, political influence, and long-term national consequences. At the center of this shift is what most people never consciously see but continuously produce: their digital DNA.
World politics
fromNextgov.com
2 months ago

Trust, trade and the new data diplomacy

Data has become the defining currency of global power. The nations and organizations that can manage, protect, and share it responsibly will shape the future of economic resilience and international cooperation. In an era where artificial intelligence and digital interdependence connect every market and mission, the ability to build and maintain trust in data is now a central pillar of both commerce and diplomacy.
World news
#age-verification-legislation
Privacy professionals
fromTheregister
1 month ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
Privacy professionals
fromTheregister
1 month ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
Privacy professionals
fromwww.housingwire.com
1 month ago

Reducing risk: Why logging, protection, and review matter

Application logs are critical cybersecurity safeguards that provide visibility into system behavior, enabling early detection of security threats and operational issues in real estate and mortgage lending organizations.
#generative-ai
Privacy technologies
fromNextgov.com
1 month ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Privacy technologies
fromNextgov.com
1 month ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
fromwww.housingwire.com
2 months ago

Can on-chain protocols make U.S. land records fraud-proof?

As HousingWire recently reported, the fragmentation across 3,000-plus local registries has created a multibillion-dollar opening for deed fraud. When ownership data is siloed and verification relies on manual oversight, the system becomes a playground for bad actors. Digitization was supposed to fix this, but moving a paper deed to a PDF doesn't change the underlying vulnerability. If a fraudulent signature is recorded digitally, the speed of the system simply makes the fraud harder to claw back.
Real estate
Privacy technologies
fromArs Technica
1 month ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
Real estate
fromwww.housingwire.com
2 months ago

America's fragmented land registries are fueling fraud and the costs are rising

Fragmented, paper-based county recording systems increase fraud risk and costs while criminals deploy advanced AI tools faster than industry defenses.
fromThe Hacker News
3 months ago

The Hidden Risk of Orphan Accounts

Traditional IAM and IGA systems are designed primarily for human users and depend on manual onboarding and integration for each application - connectors, schema mapping, entitlement catalogs, and role modeling. Many applications never make it that far. Meanwhile, non-human identities (NHIs): service accounts, bots, APIs, and agent-AI processes are natively ungoverned, operating outside standard IAM frameworks and often without ownership, visibility, or lifecycle controls.
Information security
Privacy technologies
fromTech Times
1 month ago

Top Strategies to Protect Your Online Privacy from AI Tracking and Data Collection

Implement VPNs, two-factor authentication, app permission audits, and tracker blockers to protect personal data from AI-driven monitoring and unauthorized collection.
Information security
fromBusiness Matters
1 month ago

7 Data Privacy Risks Leaders Miss in 2026

Organizations overlook seven critical privacy risks in 2026 that bypass security awareness, including public WiFi interception, malicious browser extensions, shadow AI tools, unencrypted messaging, credential reuse, unmanaged personal devices, and data retention gaps.
fromDbmaestro
5 years ago

5 Pillars of Database Compliance Automation |

There is a growing emphasis on database compliance today due to the stricter enforcement of compliance rules and regulations to safeguard user privacy. For example, GDPR fines can reach £17.5 million or 4% of annual global turnover (the higher of the two applies). Besides the direct monetary implications, companies also need to prioritize compliance to protect their brand reputation and achieve growth.
EU data protection
fromEntrepreneur
2 months ago

AI Can Delete Your Data. Here's Your Prevention Plan.

Never feel that you are totally safe. In July 2025, one company learned the hard way after an AI coding assistant it dearly trusted from Replit ended up breaching a "code freeze" and implemented a command that ended up deleting its entire product database. This was a huge blow to the staff. It effectively meant that months of extremely hard work, comprising 1,200 executive records and 1,196 company records, ended up going away.
Artificial intelligence
Information security
fromEntrepreneur
2 months ago

How to Keep Your Company's Data Out of the Wrong Hands

Data security requires keeping sensitive data local, restricting access strictly, and holding vendors to higher standards to prevent breaches, leaks, and legal exposure.
fromComputerWeekly.com
3 months ago

AI slop pushes data governance towards zero-trust models | Computer Weekly

Unverified and low quality data generated by artificial intelligence (AI) models - often known as AI slop - is forcing more security leaders to look to zero-trust models for data governance, with 50% of organisations likely to start adopting such policies by 2028, according to Gartner's seers. Currently, large language models (LLMs) are typically trained on data scraped - with or without permission - from the world wide web and other sources including books, research papers, and code repositories.
Artificial intelligence
EU data protection
fromTechzine Global
2 months ago

Metadata, cloud sovereignty's weak spot

US authorities can access some metadata of cloud users in European sovereign clouds, potentially revealing operational and behavioral information despite data residency protections.
Privacy professionals
fromZDNET
1 month ago

How to clean up your digital footprint - and why it matters more than you think

Abandoned social media accounts and old posts create digital vulnerabilities requiring regular maintenance to protect reputation and prevent identity theft or fraud.
fromCoindesk
2 months ago

Privacy

This Privacy Notice applies to all personal information processed by CoinDesk, including its affiliates and subsidiaries (" CoinDesk," " we," " us," or " our "). It covers the information CoinDesk collects through the websites, mobile applications, electronic devices, all other products and services we provide, any other services that display this Privacy Notice, all of the associated content, functionalities, and advertising, and when you communicate with us by phone, email, or otherwise (collectively, the " Services ").
Privacy professionals
fromSilicon Canals
1 month ago

The global infrastructure of digital ID is being built right now - and nobody voted for it - Silicon Canals

What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
Privacy technologies
[ Load more ]