Kicking off the “EU and Global Cybersecurity Fundamentals” course: The concept of cybersecurity and an introduction to cryptographic tools

By No tags Permalink

I am very pleased that today we will start teaching the EU and Global Cybersecurity Fundamentals course within the Advanced Master in Privacy, Cybersecurity and Data Management LLM we created at ECPC. Today we will kick off the course with Brian Honan, who will lecture on the concept of cybersecurity and provide an introduction to cryptographic tools. Having in place a meaningful and robust ...

I am running the TCS Amsterdam Marathon to raise funds for the children with rare diseases / Corro la TCS Amsterdam Marathon per raccogliere fondi per i bambini con malattie rare

By No tags Permalink

Tomorrow I am running the TCS Amsterdam Marathon to raise funds for  the volunteer organization Fiori di Campo and its Children with Rare Diseases Project. To run a marathon is about fighting against yourself and your weaknesses, it entails testing yourself physically and mentally, pushing forward when you think you can’t go on any longer. It ...

Data geopolitics: The UK is moving fast on data transfers with possible adequacy for the Dubai International Financial Centre

The United Kingdom (UK) is demonstrating its agility on data transfers after leaving the European Union (EU). Through its global data plans and new strategic alliances (i.e., adequacy procedures) the UK is moving ahead to reshape international data flows and the global digital economy. The United States, Australia, the Republic of Korea, Singapore, the Dubai International Finance Centre, ...

The future of EU-US data transfers

Last week I was interviewed by Laurie Clarke about the future of EU-US data transfers and what the US needs to do to make a new agreement a reality. Read “After a year of limbo a EU-US data privacy agreement still hangs in the balance” published in Tech Monitor, part of the New Statesman Media ...

The challenging job of Supervisory Authorities under the GDPR

How can the General Data Protection Regulation (GDPR) be effectively enforced so as to uphold fundamental rights and freedoms and at the same time, allow for the free flow of data within the Union? This is a question I have been pondering since well before Monday’s publication of the Irish Council for Civil Liberties’s (ICCL) 2021 report on the ...

The race to digitalize Africa and the importance of data security by design

By No tags Permalink

China has affirmed its intention to actively support Africa in the development of its digital infrastructure and connectivity. This was confirmed by Chinese Assistant Foreign Minister Deng Li on 24 August when speaking about the China-Africa Partnership Plan on Digital Innovation at the China-Africa Internet Development and Cooperation Forum. Indeed, China is looking to promote technologies such as ...

The UK’s “data challenge” to the EU

This blog post is a re-elaboration of my interview this morning with Luca Bertuzzi, Digital & Media Editor from EurActiv, available here. Today the UK unveiled its “post-Brexit global data plans to boost growth, increase trade and improve healthcare”, which also include a multi-billion pound partnership with the US, Australia and the Republic of Korea.  Secretary of State ...

Vulnerability alert: IoT devices attacked through ThroughTek “Kalay” network

Millions of IoT devices, which include cameras, smart baby monitors, and Digital Video Recorder (DVR) products, may be impacted by a vulnerability that uses the ThroughTek “Kalay” network. ThroughTek claims to have more than 1.1 billion connections per month and 83 million active devices. The vulnerability, discovered by researchers, poses a very high risk to the privacy and security ...

“The next great financial crisis could come from a cyber attack”: 5 critical cybersecurity measures you should put in place today

The 2021 Report on the SolarWinds Cyber Espionage Attack and Institutions’ Response published by the New York State Department of Financial Services (“Report”) commences with a stark warning: “The next great financial crisis could come from a cyber attack.” “The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a ...

How data minimization, data quality, and storage limitation can help in the fight against climate change

Over the last 20 years, access to cheap computational capacity has increasingly led to the harvesting of more and more personal data, without having to worry too much about costs related to data storage and processing activities. For this very reason (and all too often), data sets are offhandedly replicated, databases are left unmanaged, and the same ...