A new publication in a reputable journal
News & Events PublicationsSeptember 28, 2023
Dr. Daniel Dimov has just published an article entitled “Strategies for Dealing with Reverse Domain Name Hijacking” in the...
We got a certificate from Harvard Business School
Certifications News & EventsAugust 7, 2023
Our privacy lawyer, Rasa Juzenaite LLM, obtained a Certificate in Business Analytics from Harvard Business School. The certificate demonstrates...
We are now ECPC-B DPO certified
Certifications News & EventsJanuary 30, 2023
In December 2022, our co-founder, Rasa Juzenaite, who is a Certified Information Privacy Professional (CIPP/Europe and the United States) and...
Key findings from ESG’s Modern Application Development Security report
Application security PressJune 16, 2021
A deep dive into security issues
In August 2020, the Enterprise Strategy Group (ESG) published its report, “Modern Application Development...
Octopus Scanner malware: What it is, how it works and how to prevent it | Malware spotlight
Malware Analysis PressDecember 9, 2020
Introduction
Octopus Scanner appeared somewhere in 2018. Although its creators are still unknown, the operation of Octopus Scanner has...
Business email compromise (BEC) scams level up: How to spot the most sophisticated BEC attacks
Press Security awarenessOctober 27, 2020
Introduction to BEC attacks
The term “business email compromise” (BEC) refers to the use of email fraud with the aim to accomplish...
Tesla Model 3 vulnerability: What you need to know about the web browser bug
Malware Analysis News & EventsAugust 5, 2020
Introduction
In 2020, Jacob Archuleta, a researcher nicknamed Nullze, discovered an important information security vulnerability on...
The State of the Art and the Future of GDPR Compliance Software
BlogMarch 15, 2020
The General Data Protection Regulation (GDPR) is an EU regulation that became effective on the 25th of May 2018. It imposes a number of...
Understanding Privacy Risks and Benefits of Skype Communication
BlogJanuary 27, 2020
Although Skype is considered by many to be a secure and privacy-oriented Voice over Internet Protocol (VoIP) messenger, privacy activists often...
FinCEN BEC attacks report: Analysis
BlogNovember 20, 2019
The Financial Crimes Enforcement Network (FinCEN) is a U.S. government institution responsible for collecting and analyzing financial information...
Can We Expect a U.S. Federal Consumer Privacy Law?
BlogSeptember 6, 2019
The EU General Data Protection Regulation (GDPR) came into effect on the 25th of May 2018. Shortly afterwards, the EU data protection authorities...
How to ensure Windows Server is GDPR-compliant
BlogAugust 20, 2019
The General Data Protection Regulation (GDPR), an EU law regulating the processing of personal data, came into force on May 25th, 2018....
5 Common Myths About the GDPR
BlogJune 12, 2019
The EU General Data Protection Regulation (GDPR) entered into force on the 25th of May 2018. Since that time, companies have spent billions of...
What do Linux system administrators need to know about the GDPR?
BlogApril 15, 2019
The General Data Protection Regulation (GDPR) is a European Union law that applies not only to EU companies, but also to all companies collecting...
Is Kleros a Fair Dispute Resolution System?
BlogOctober 21, 2018
Kleros’ approach to arbitration is radically different to traditional court systems and alternative dispute resolution methods. Relying on...