Rina Steenkamp - Privacy and technology

Weblog

2013

April

[The retention of the fingerprints of a person who had not been convicted breached his right to respect for his private life | The disconcerting details - How Facebook teams up with data brokers to show you targeted ads | 2013 Data breach investigations report | 2013 Information security breaches survey | 1Q 2013 security roundup - Zero-days hit users hard at the start of the year | "How old do you think I am?": A study of language and age in Twitter | Net neutrality in Europe | Clarifications regarding the U.S.-EU Safe Harbor framework and cloud computing | Can recent attacks really threaten Internet availability? | Microsoft security intelligence report - Volume 14 | Internet security threat report 2013 | Opinion 03/2013 on purpose limitation | Internet privacy - the right to be forgotten | Avoiding the hidden costs of the cloud | The modern malware review - Analysis of new and evasive malware in live enterprise networks | EU online trustmarks - Building digital confidence in Europe | Sleights of privacy - framing, disclosures, and the limits of transparency | The pursuit of privacy in a world where information control is falling | Privacy 101 - Skype leaks your location]

Bredere kijk op gegevens - Programmarapportage Informatieprocessen

[Lees verder]

Audit Alert - Keteninformatisering

[Lees verder]

Trends in veiligheid 2013 - Een digitale samenleving kan niet zonder digitale veiligheid

[Lees verder]

Google, stille getuige van moord

[Lees verder]

Internetvrijheid toolbox

[Lees verder]

Aanpak van ICT door het Rijk 2012 - Lessons learned

[Lees verder]

Gebruik RC4 in TLS ontraden

[Lees verder]