placeholder

Cyber Diplomacy: Protecting Democracy and the Digital Way of Life

Few fields generate divisive trends internationally as much as the cybersphere. With the emergence of information society and its establishment reaching full maturity, advantages come together with risks. Cyber Diplomat Heli Tiirmaa-Klaar, Estonia’s Ambassador at Large for Cyber Security, shares her informed thoughts on protecting democracy and the digital way of life in this short but salient interview.

placeholder

Considering Employer Liability for Release of PII in Data Breaches

Hackers can use PII to obtain by fraud employment, loans, credit cards and can file tax returns. Criminals can also use PII to steal government benefits and create false identification for use in further schemes. Stolen PII is frequently bought and sold amongst various criminals on “dark markets.”

placeholder

Tracing Illegal Activity Through The Bitcoin Blockchain

By examining blockchain activity closely, companies focused on combating cryptocurrency related crimes can pinpoint accounts that appear to belong to the same Bitcoin wallet and are controlled by the same entity. This process is known as “clustering.”

New EU Regulation to Strengthen the Free Movement of Data

In June 2018, the EU legislative institutions announced that they had reached agreement on a framework for the free flow of non-personal data in the European Union (the “Draft Regulation”). After its formal adoption, the Draft Regulation will become directly applicable law in all EU Member States six months after its official publication.

Adapting Blockchain for GDPR Compliance

Blockchain’s identification management processes, such as the ones that store and process personally identifiable information (PII), are crucial in designing GDPR-compliant solutions.