
The “non-sensitive data” trap: the costly mistake for companies
A wonderfully widespread argument among those who work with personal data is that of underestimating the risks or refusing to address them at all. This
A wonderfully widespread argument among those who work with personal data is that of underestimating the risks or refusing to address them at all. This
Managing employee email inboxes is often overlooked by organizations, despite the widespread use of email and its significant impact on privacy and security . Despite
We had already discussed the proposed “ChatControl” regulation almost two years ago, but given the roadmap currently underway, we find ourselves embarrassed to have to
When talking about information security, we must first take a breath and realize that we need to dive deeper than just computer systems and directly
April 1st wasn’t an April Fool’s joke: the first hearing in the Latombe v. Commission case was adjourned to September 3rd for a ruling on
Managing security is far from simple, it’s not something that can be standardized, and above all, it can’t be achieved through “solutions.” It requires planning,
The “Tea Dating Advice” app reported a data breach on July 25, 2025, involving 72,000 images of users registered before February 2024, including 13,000 selfies