See more of Ghostery by logging into Facebook
Message this Page, learn about upcoming events and more.
See more of Ghostery by logging into Facebook
Message this Page, learn about upcoming events and more.
Not Now
Community
Icon of invite friends to like the lage
Invite your friends to like this Page
Highlights info row image
62,043 people like this
People Also Like
Pages liked by this Page
Photos
Videos
Working at Ghostery
29
2
New submission for our Vine contest! You can email us for a Ghosty squish ball to make your own. See all of the submissions, as they roll in, here: http://ghosteryvines.tumblr.com/
11
Saturday @NY_Comic_Con is a GOOD TIME! Come on over to the @Ghostery booth. #NYCC2015 #NYCC
7
Posts

Why Understanding And Control Should Be Key Parts Of Your #Cybersecurity Portfolio http://bit.ly/2rBVhuN #ghostery #security

All physical security relies on understanding. There’s no physical security discipline where you would try to protect a space that you didn’t understand. Yet in cybersecurity many say the data center is too complicated, changes too fast, is too heterogeneous, and we focus on detection instead.
https://www.forbes.com/sites/danwoods/2017/05/26/w...|By Dan Woods
The medical device industry appears to be under siege by cybercriminals, but it isn't taking steps to defend itself, according to two separate reports.
http://www.fiercebiotech.com/medtech/medical-devic...
Posts

Experts want clarity among potential #IoT regulations http://bit.ly/2sbjWDj #ghostsery #security #privacy

In an increasingly complex Internet of Things ecosystem, experts are calling for a consistent national strategy. The biggest need, said Josh New, chief policy analyst at the Information Technology and Innovation Foundation, is “regulatory clarity.” “Agencies need to all be talking to each other to m...
https://www.fedscoop.com/experts-want-clarity-amon...

Artificial intelligence #data #privacy issues on the rise http://bit.ly/2sbtmPe #ghostery #security #AI @TechTarget

Artificial intelligence data is more personalized than ever, and IT departments need to consider end-user privacy as machine learning enters the enterprise.
http://searchmobilecomputing.techtarget.com/news/4...
GDPR will protect EU citizens from data and privacy breaches while net neutrality could soon become a thing of the past in the US.
http://www.itproportal.com/features/data-privacy-t...|By ITProPortal.com

Identity thieves used stolen #data 9 minutes after it was posted #online http://cnnmon.ie/2rZk2xT #ghostery #security #privacy

The FTC studied tactics of identity thieves.
http://money.cnn.com/2017/05/26/technology/identit...

Why Understanding And Control Should Be Key Parts Of Your #Cybersecurity Portfolio http://bit.ly/2rpKHXz #ghostery #security #privacy

All physical security relies on understanding. There’s no physical security discipline where you would try to protect a space that you didn’t understand. Yet in cybersecurity many say the data center is too complicated, changes too fast, is too heterogeneous, and we focus on detection instead.
https://www.forbes.com/sites/danwoods/2017/05/26/w...|By Dan Woods

#Internet Of Things #Security – Are You Failing To Prepare? http://bit.ly/2rZ7RRL #ghostery #IoT

Flickering lightbulbs, scary Barbie dolls, infected computer networks and cities out of action. Could this be the brave new world of the Internet of Things (IoT), if we neglect IoT security? Ian Kilpatrick, EVP Cyber Security for Nuvias Group, discusses the unstoppable growth of IoT and the necessit...
http://www.informationsecuritybuzz.com/articles/in...

Addressing #GDPR Across The Whole Enterprise http://bit.ly/2rpUz3J #ghostery #security #privacy

Key stats on GDPR: Compuware – taken from its May global survey of 400 CIOs conducted by Vanson Bourne: 67% of European and 88% of U.S. organisations with European customer data say they are well-briefed on GDPR; an improvement on 55% and 73% respectively when the same question was asked last year. ...
http://www.informationsecuritybuzz.com/expert-comm...
http://www.csoonline.com/article/3198458/cyber-att...
http://www.nojitter.com/post/240172673/cisco-flexe...

.@Google #data mine digs into credit-card #privacy http://bit.ly/2rorw0h #ghostery #security

SAN FRANCISCO - Google has begun using billions of credit-card transaction records to prove that its online ads are prompting people to make purchases - even when they happen offline in brick-and-mortar stores, the company said Tuesday.
http://www.theoaklandpress.com/general-news/201705...
First National Technology Solutions says software updates, constant patching and employee education are musts.
http://www.healthcareitnews.com/news/wannacry-and-...

.@Microsoft Is Said to Be Eyeing Another #Cybersecurity Buy http://for.tn/2rUZyq3 #ghostery #security #privacy

Microsoft has big plans (and financial commitments) in place for boosting cybersecurity.
http://fortune.com/2017/05/24/microsoft-cybersecur...

#Data #Security & #Privacy: The Risks of Not Playing by the Rules http://ubm.io/2rlwb32 #ghostery

Achieving compliance is a complex and challenging process. But with the right systems and policies, you can stay ahead of the next data breach - and the regulators.
http://www.darkreading.com/risk/data-security-and-...