Social Media Should Have Strict Privacy

Nearly 4,000  IT security professionals attending the Black Hat USA 2019 have been surveyed and eighty percent of these high;y informed  IT security professionals agree that more security and privacy laws are needed, especially for social media organisations that often store massive amounts of our personal data. 
 
However, 82% of IT pros don’t believe their elected officials properly understand the cyber risks well enough to develop and enact effective security regulation, a Venafi survey reveals.
 
 Other findings from the survey include:
 
• Ninety-three percent do not trust social media organisations to protect their personally identifiable information.
• Eighty-two percent do not trust the government to protect their personally identifiable information.
• Eighty percent of respondents say government officials do not understand the cyber risks targeting digital infrastructure.
 
“There’s a global wave of legislators, regulators and law enforcement officials proposing controversial surveillance laws such as government mandated encryption backdoors,” said Kevin Bocek, vice president of security strategy and threat intelligence at  encryption and security experst Venafi
 
“However, security professionals lack confidence in politicians’ abilities to improve cybersecurity given the unabated flood of government breaches in the US and around the world. 
 
“The results of our survey send a clear message that governments must improve their cyber-security fluency in order to make a meaningful impact and help our frontline defenders protect the global economy, freedoms and privacy.”
 
HelpNetSecurity:
 
You Might Also Read: 
 
Privacy: Can You Trust FaceApp With Your Face?:
 
The Digital Future Is About Disintegration:
 
 
 
 
 
« Human Participation Lies Behind 99% Of Cyber Attacks
AI - Driven Warfare Using Robots »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CyberSecurityJobsite.com

CyberSecurityJobsite.com

CyberSecurityJobsite.com is a specialist job board designed to attract candidates working within Cyber Security, Information Security or Information Assurance.

BioCatch

BioCatch

BioCatch uses behavioral biometrics for fraud prevention and detection. Continuous authentication for web and mobile applications to prevent new account fraud.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Infosistem

Infosistem

Infosistem is a Croatian ICT company with extensive expertise and experience in enterprise and SMB ICT projects and solutions.

Samoby

Samoby

Samoby provide a subscription solution for Mobile Threat Protection and usage control on Android and iOS devices.

Novastor

Novastor

NovaStor® is an award-winning, international data backup and recovery software company with solutions supporting physical, virtual and cloud environments.

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

Start Left® Security

Start Left® Security

Great security culture doesn't just happen; you ENGINEER it.

Park Place Technologies

Park Place Technologies

Park Place Technologies' mission is to drive uptime, performance and value for critical IT infrastructure.

ACL Digital

ACL Digital

ACL Digital, an ALTEN Group company, is a leader in design-led digital experience, innovation, enterprise modernization, and product engineering services converging to Technology, Media & Telecom.

iManage

iManage

iManage's intelligent, cloud-enabled, secure knowledge work platform enables organizations to uncover and activate the knowledge that exists inside their business.

Veriti

Veriti

Veriti is a unified security posture management platform that integrates with your security solutions and proactively identifies and remediates potential risks and misconfigurations.

Serbus

Serbus

Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools.

HashiCorp

HashiCorp

At HashiCorp, we believe infrastructure enables innovation, and we are helping organizations to operate that infrastructure in the cloud.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

Elitery

Elitery

Elitery is an IT-managed service company that focuses on cloud and cybersecurity services.