🗞️ Needed report By CyberArk on a burning issue : identity security. A decisive element that will determine our ability to restore digital trust. 🔹 « Identity is now the primary attack surface. » Defenders must secure every identity — human and machine 🔹 with dynamic privilege controls, automation, and AI-enhanced monitoring 🔹and prepare now for LLM abuse and quantum disruption. Machine identities are the fastest-growing attack surface 🔹Growth outpaces human identities 45:1. 🔹Nearly half of machine identities access sensitive data, yet 2/3of organizations don’t treat them as privileged. Quantum readiness is urgent 🔹Quantum computing will break today’s cryptography (RSA, TLS, identity tokens). 🔹Transition planning to quantum-safe algorithms must start now, even before standards are finalized. Large Language Models include prompt injection, data leakage, and misuse of AI agents. So organizations must treat them as a new class of machine identity requiring monitoring, access controls, and secrets management. 🧰 What can we do? ⚒️ 1/ Implement Zero Standing Privileges (ZSP) • Remove always-on entitlements; grant access dynamically and just-in-time. • Minimize lateral movement by revoking privileges once tasks are complete 👥2/ Secure the full spectrum of identities • Differentiate controls for workforce, IT, developers, and machines. • Prioritize machine identities: vault credentials, rotate secrets, and eliminate hard-coded keys. 🛡️ 3/ Embed intelligent privilege controls • Apply session protection, isolation, and monitoring to high-risk access. • Enforce least privilege on endpoints; block or sandbox unknown apps. • Deploy Identity Threat Detection & Response (ITDR) for continuous monitoring. ♻️ 4/ Automate identity lifecycle management • Use orchestration to onboard, provision, rotate, and deprovision identities at scale. • Relieve staff from manual tasks, counter skill shortages, and improve compliance readiness. 5/ Align security with business and regulatory drivers • Build an “identity fabric” across IAM, PAM, cloud, SaaS, and compliance. • Tie metrics (KPIs, ROI, cyber insurance conditions) to board-level priorities. 6/ Prepare for next-generation threats • Establish AI/LLM security policies: control access, monitor usage, audit logs. • Begin phased adoption of post-quantum cryptography to protect long-lived sensitive data. Enjoy the read
Online Privacy Tools
Explore top LinkedIn content from expert professionals.
-
-
The Salt Typhoon Espionage Campaign: A Wake-Up Call for the Telecommunications Industry The more we uncover about the Salt Typhoon cyberespionage campaign, the more alarming it becomes. A ninth U.S. telecommunications company has now been confirmed as a victim of this sweeping Chinese operation, which granted Beijing officials access to private text messages and phone calls of countless Americans. This should serve as a wake-up call for the urgent need to prioritize cybersecurity in the telecommunications sector. Robust defenses and proactive measures must become the standard. Here's what you can do for now: 1️⃣ Use End-to-End Encrypted Messaging Apps: Opt for apps like Signal that prioritize encryption. When selecting an end-to-end encrypted messaging app, evaluate whether the app collects and stores metadata to ensure your privacy is fully protected. 2️⃣ Secure Password Management: Use strong, unique passwords and rely on trusted password managers to store your credentials securely. 3️⃣ Avoid Unsecured VPNs: Be cautious with free or commercial VPNs which usually have questionable security policies that make them 'free'. Research providers thoroughly before trusting them with your data. 4️⃣ Regular Software Updates: Keeping device operating systems up-to-date is essential for patching vulnerabilities and maintaining robust security. At AdvisorDefense, we specialize in helping organizations fortify their cybersecurity strategies. From consulting on secure communications solutions to implementing advanced threat detection systems, our expertise ensures that your organization stays one step ahead of evolving threats. How is your organization preparing for the next wave of cyber threats? #Cybersecurity #Telecommunications #AdvisorDefense #SaltTyphoon #DataPrivacy #SecureCommunications https://lnkd.in/emX8kkJX
-
Location-broker data leak & the ballad of privacy So, a company called Gravy Analytics – a location-data broker – was hacked and suffered a major leak. But what does a “location data broker” do? These companies basically trade our data (yeah, yours and mine) received from mobile apps, ad networks, smart devices – even cars. So Gravy collected it, someone stole it, and now it’s out there. There were no names or IDs in the leak; however, it appears that with a little digital wizardry, hackers can de-anonymize real people – uncovering home addresses, workplaces, favorite shopping spots, and more. Only a slice of the stolen data has become public so far (the whole database appears to be massive), but yes – it covers the whole world. What can you do to decrease your geolocation footprint? 1️⃣ Be picky with app permissions. Don’t grant location access unless it’s absolutely necessary. 2️⃣ Tighten up your privacy settings. Limit data-sharing in the apps you use. 3️⃣ Block background location tracking. 4️⃣ Ditch unused apps. Fewer apps – fewer problems. 5️⃣ Kill your ad ID. Disable it on iOS, or delete it on Android. 6️⃣ Use anti-tracking tools. Let’s be real: online privacy isn’t something to be optimistic about. But that doesn’t mean ditching basic digital hygiene is a good idea. More about the story, as well as practical steps to protect your data – here: https://kas.pr/c99m
-
"Privacy is Safety" - Debbie Reynolds “The Data Diva” "The Data Privacy Advantage" Newsletter is here! 🌐📬 This month's focus is on the "Privacy’s "Safety by Design" Framework: A Path to Safer, Privacy-First Products" 💡 What is the “Safety by Design” Privacy Framework? The framework is a proactive approach integrating privacy into every step of the product lifecycle, ensuring protection against modern privacy threats like cyber harassment, location misuse, and unauthorized tracking. This approach supports compliance and builds user trust by demonstrating a commitment to safety and security. 📌 The "Safety by Design” Privacy Framework Overview: 1. 🔍 Data Collection & User Consent 📍 Context-Based Incremental Consent 🔔 Clear Visual Cues for Data Collection 🔄 Limit Sensitive Data Collection in Third-Party Integrations ❌ Prevent Cross-Device Tracking Without Explicit Consent 🗂️ Transparent Consent Flows 2. 🔒 Data Minimization & User Control 🛠️ Privacy-Centric Defaults 👥 Customizable Privacy Controls for Contact Groups 👀 Mask or Hide Personal Information in Public Profiles ⏸️ Temporary Account Deactivation or Anonymization ⏱️ Time-Limited, Expiring Access Links for Sensitive Data 3. 📍 Location Privacy & Data Masking 🔒 Opt-In for Location Tracking ⏲️ Time-Limited Permissions for Location and Data Sharing 📌 Easy Options to Delete, Pause, or Disable Location History: 🚫 Turn Off Real-Time Activity Broadcasting: 🕶️ Invisible Mode or Alias-Based Settings 🔹 Real-World Examples: When Apple and Google noticed AirTags being misused for tracking, they implemented cross-platform notifications to alert users to unauthorized tracking devices—a powerful example of privacy as safety by design. By acting proactively, these companies protected users and reinforced their commitment to safety-first innovation. Why It Matters Privacy is increasingly intertwined with safety. With the "Safety by Design" Framework, companies can go beyond compliance to create stronger, safer relationships with their users. This approach is essential as regulations evolve but cannot keep up with every new tech risk. Adopting this framework helps make privacy a business advantage and shows a company’s genuine commitment to protecting user data and well-being. 📈 Safety by Design is not just about preventing fines—it's about making a meaningful impact on users' lives. Let's prioritize safety together. 🚀 Empower your organization to master the complexities of Privacy and Emerging Technologies! Gain a real business advantage with our tailored solutions. Reach out today to discover how we can help you stay ahead of the curve. 📈✨ Debbie Reynolds Consulting, LLC #privacy #cybersecurity #DataPrivacy #AI #DataDiva #EmergingTech #PrivacybyDesign #DataPrivacy #SafetyFirst #DigitalSafety #CyberHarassment #DataMinimization #UserControl #LocationPrivacy #SafetyByDesign #UserTrust
-
Analysis of "Cookies, Identifiers and Other Data That Google Silently Stores on Android Handsets" Study This study, conducted by D.J. Leith from Trinity College Dublin, investigates the data stored on Android devices by pre-installed Google apps, including Google Play Services and the Google Play Store. The findings raise significant privacy concerns related to user consent, data tracking, and compliance with EU privacy regulations (GDPR & e-Privacy Directive). Potential Legal and Privacy Implications Violation of EU e-Privacy Directive - Article 5(3) of the e-Privacy Directive requires explicit user consent before storing or accessing any data on user devices. - No consent is sought for any of the cookies or identifiers stored by Google. - No opt-out mechanism is provided, meaning users have no control over this tracking. Potential GDPR Violations - Google Android ID, DSID, NID, and other identifiers likely count as personal data under GDPR. - Google’s lack of transparency about the use of these identifiers violates GDPR’s principles of lawfulness, fairness, and transparency. - Processing of sensitive data (e.g., sexual orientation via Play Store ad tracking on "gay dating apps") requires explicit consent under GDPR Article 9. - Google automatically logging users into multiple apps without consent could violate GDPR’s purpose limitation principle. What This Means for Users - Even if you factory reset your Android device and don’t use Google apps, tracking still happens. - Google is automatically logging users into multiple services, collecting telemetry data, and storing tracking identifiers without consent. - The study suggests Google may be violating both GDPR and the EU e-Privacy Directive. This study provides strong technical evidence that Google is storing personal data without user consent and in a manner that may violate EU privacy laws. The lack of transparency and opt-out options is particularly concerning. If regulators take action, this could lead to major legal consequences for Google, similar to past GDPR fines. However, for now, Android users remain heavily tracked unless they take active measures to limit Google’s data collection. Notice: Since the study was published, Google has announced fingerprinting is now applied across all devices and services, meaning the potential impact of Googles abuse in data collection is now unparalleled, and it makes Google one of the most data collecting organizations on the planet. Direct link to the study: https://lnkd.in/gXj2fr2c #Privacy #GDPR #DataProtection #ePrivacy #GoogleTracking #AndroidPrivacy #UserConsent #BigTech #CyberSecurity #TechRegulation #SurveillanceEconomy #DigitalRights #TechEthics
-
Imagine saving a random contact years ago—and now they can track your location just because you ordered dinner on Zomato Zomato’s “Friend Recommendations” feature just gave me a mini existential crisis. I never gave the app access to my contacts, never synced anything, never chose to “follow” anyone—and yet, a bunch of random people from my phonebook were listed as “friends.” I could see their food choices, recommendations, and even my brother’s activity—someone who swears he’s never officially recommended a single dish on the app. I could even see recommendations from my 3rd floor neighbour or someone whose contact I saved 15 years ago but don’t even remember who they are. So perhaps our actions—like ratings or just ordering frequently—are being interpreted as recommendations and shown to others. So basically I can see where all they order from and perhaps where they live? Perhaps. How? Welcome to the eerie world of data triangulation and invisible profiling. Even passive behavior—like ordering food without leaving a review—is being interpreted, tagged, and shared under the veil of “social recommendations.” This isn’t just about food anymore. It’s a reminder of how platforms construct detailed behavioral profiles from seemingly innocuous actions. It’s also a reminder of how transparency, consent, and user agency remain alarmingly vague in our digital ecosystems. Scary? Yes. Surprising? Sadly, not anymore. #DigitalPrivacy #AlgorithmicProfiling #TechEthics #Zomato #SurveillanceEconomy #DataTransparency
-
Are Your Text Messages Safe? The FBI and CISA encourage Americans to use encrypted messaging apps to protect their communications from threat actors. We rely on messaging for everything—personal chats, business deals, and even two-factor authentication. You should know that your text messages and even phone calls are not as secure as you think. The FBI and Cybersecurity and Infrastructure Security Agency (CISA) recently released information on Chinese government-affiliated threat actors targeting US commercial telecom infrastructure. The hacking campaign, nicknamed Salt Typhoon, is one of the largest intelligence compromises in US history. Text messages sent between iPhones and Androids lack automatic encryption, making them vulnerable to interception by scammers and nation-state hackers. CISA released mobile communications guidance that can help you protect your communications: 🔐Switch to Encrypted Messaging Apps: Use apps like WhatsApp or Signal for end-to-end encryption to keep your conversations private. Consider using features like disappearing messages that can enhance privacy. 🔐Stop using SMS text messages for Multi-Factor Authentication (MFA): SMS messages are not encrypted and can be intercepted by threat actors that have compromised the telecom service provider. Migrate to an app with authenticator codes or use passkeys. 🔐Set a Telco PIN. Most telecom providers offer the ability to set a PIN for your mobile phone account. This PIN is required for logging into your account or completing sensitive operations, such as porting your phone number—a critical step to defend against subscriber identity module (SIM)-swapping techniques. 🔐 Regularly Update Software: Keeping your device software up to date is a simple but powerful defense against security vulnerabilities. Enable automatic updates and frequently verify that devices are running the latest software versions. Whether you’re a government official, or everyday professional, your privacy matters. Take these small steps to make sure your digital life stays secure. What’s your go-to secure messaging app? #CyberSecurity #CISA #EncryptedMessaging #DataPrivacy
-
The National Security Agency recently issued a warning that Russian 🇷🇺 threat actors are exploiting the secure messaging app Signal Messenger “linked devices” feature to intercept encrypted conversations. This threat also extends to other popular messaging applications such as WhatsApp and Telegram Messenger as well. 𝐖𝐚𝐢𝐭... 𝐬𝐨 𝐒𝐢𝐠𝐧𝐚𝐥 𝐢𝐬 𝐛𝐫𝐨𝐤𝐞𝐧? Nope. The app did exactly what it was designed to do. End-to-end encryption protects data in transit, but if users invite attackers or sync devices unknowingly, the application is still compromised. 𝐖𝐡𝐚𝐭 𝐚𝐫𝐞 𝐭𝐡𝐞 𝐫𝐢𝐬𝐤𝐲 𝐟𝐞𝐚𝐭𝐮𝐫𝐞𝐬? 🔺Group Invite Links – Attackers can sneak into your group if you share an invite link. (Duh!) 🔺Linked Devices – Lets you sync Signal to your laptop or tablet. Attackers can use this to silently add their own device and see everything. 𝐖𝐡𝐚𝐭 𝐬𝐡𝐨𝐮𝐥𝐝 𝐈 𝐝𝐨? 🔸Check Linked Devices – Go to settings in Signal or WhatsApp and remove any devices you don’t recognise. If in doubt, unlink it. 🔸Lock Down Group Chats – Turn off group invite links for sensitive chats. Only allow admins to add people. 🔸Add Extra Security – Use a screen lock and app passcode to stop others getting into your messages if your phone is lost or stolen. 🔸Think Before You Tap or Scan – Don’t click on weird links, or scan random QR codes or accept surprise invites even from friends. Their accounts might be hacked, too. 𝐓𝐡𝐞 𝐦𝐨𝐫𝐚𝐥 𝐨𝐟 𝐭𝐡𝐞 𝐬𝐭𝐨𝐫𝐲. 💡Apps like Signal, WhatsApp, and Telegram are safe only if you use them safely. A silly click can ruin all the fancy encryption. Read on https://lnkd.in/g_j9JiCE https://lnkd.in/gdiqwZ2P
-
Cybersecurity isn’t just an IT issue — it’s a life skill. Every time we go online — whether for work or personal matters — we expose ourselves to potential cyber threats. A single phishing email, a weak password, or an unprotected payment method could lead to serious data breaches, financial loss, or identity theft. That’s why cultivating daily cyber hygiene matters more than ever. In our newest podcast episode, April Gay, MWM Chief Operating Officer, joins me to bring you actionable strategies, including: * Spotting the subtle warning signs of phishing and fraudulent emails * Leveraging tools like Apple Pay, Google Pay, and multi-factor authentication for secure transactions * Implementing smart password habits and proactive password management Whether you're safeguarding your personal data or strengthening your company’s defenses, these best practices are essential in our increasingly connected world. Tune in now to gain insights and equip yourself with real‑world tips to stay ahead of cyber threats. Find it on Apple Podcast: https://lnkd.in/e_z_iR57 Or on Spotify: https://lnkd.in/eQ3rds9M #Cybersecurity #DigitalSafety #InfoSec #BestPractices #StaySecure
Explore categories
- Hospitality & Tourism
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Healthcare
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Career
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development