Personal Data Protection

Blog

Pseudonymity means real privacy

In my last posting, I stated that “privacy is not anonymity”. I received a few questions about that, so today I want to elaborate on the subject. Let’s get something out of the way right off the bat – there is not, nor can there be, true “anonymity” on the internet – or almost anywhere…

Blog

In search of privacy

Way back in 1999, Scott McNealy – then the chief executive officer of Sun Microsystems – famously said that consumer privacy issues are a "red herring." He went on to say: "You have zero privacy anyway, get over it." Yet just in the past two weeks privacy has been much in the news on many…

Blog

Privacy is back – the discussion about the new German law on citizen registration

Germany has, in contrast to many other countries, a mandatory citizen registration. One side effect is the national ID card (now an eID). Another is that there are registration offices at every local authority. And there is a law called “Melderechtsrahmengesetz” (MRRG) which rules everything…

Advisory Note

Advisory Note: Dealing with privacy risks in mobile environments - 70224

The ongoing trend of IT consumerization and deperimeterization has a profound effect on modern society. Mobile devices are becoming increasingly sophisticated and their numbers are growing exponentially. Social networking has made sharing information all too easy and controlling its spread…

Webcast

EIC 2012 Keynote: Interview - What are the Privacy and Information Security Challenges 2012 and Beyond?

Roy Adar, Vice President of Product Management, Cyber-Ark Dr. Nigel Cameron, CEO, Center for Policy on Emerging Technologies Martin Kuppinger, KuppingerCole Shirief Nosseir, Marketing Manager, CA Technologies Jim Taylor, VP Identity and Security Management, NetIQ April 17, 2012 15:40

Webcast

EIC 2012 Keynote: The Future of Attribute-based Credentials and Partial Identities for a more Privacy Friendly Internet

Prof. Dr. Kai Rannenberg, T-Mobile Chair of Mobile Business & Multilateral Security, Goethe University in Frankfurt April 19, 2012 9:00

Advisory Note

Advisory Note: Life Management Platforms: Control and Privacy for Personal Data - 70608

Life Management Platforms will change the way individuals deal with sensitive information like their health data, insurance data, and many other types of information – information that today frequently is paper-based or, when it comes to personal opinions, only in the mind of the…

Blog

Non-working P3P privacy policies in browsers - whom to blame?

Another recent discussion was about Microsoft blaming Google and Facebook for circumventing IE privacy policies. There were many articles about that issue, two of them you’ll find here: http://www.networkworld.com/news/2012/022012-microsoft-says-google-circumvents-ie-256358.html?hpg1=bn…

Blog

Google’s Privacy Policy – the market will decide

There has been a lot of noise around Google changing its privacy policies. My esteemed colleague Dave Kearns said that they just consolidated them. I’ll stay with “changed”, due to the effect of this: Google now can do much more with the user’s data – if the user logs into any Google…

Blog

Data Protection and the Cloud

Nowhere is the uncertainty surrounding data protection currently greater than with regard to cloud services. Microsoft is on the right track with its extensive implementation of the EU standard contract clauses, writes Martin Kuppinger. At the end of last year, Microsoft brought its Office…

Webcast

Privacy by Design

KuppingerCole Webinar recording

Webinar

Jan 26, 2012: Privacy by Design

2011 was, once again, a bad year for privacy as data breaches releasing usernames, passwords, credit card details and even medical records continued to make news right through the end of the year. Time has proven that no amount of imposed regulation can protect privacy in the face of a…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

How to Train Your AI to Mis-Identify Dragons

This week Skylight Cyber disclosed that they were able to fool a popular “AI”-based Endpoint Protection (EPP) solution into incorrectly marking malware as safe. While trying to reverse-engineer the details of the solution's Machine Learning (ML) engine, the researchers found that it contained a secondary ML model added specifically to whitelist certain types of software like popular games. Supposedly, it was added to reduce the number of false positives their "main engine" was [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00