Tag: GDPR

  • The Register: ‘Impossible hill to climb’: US clouds crush European competition on their home turf

    Source URL: https://www.theregister.com/2025/07/28/euro_cloud_vs_us/ Source: The Register Title: ‘Impossible hill to climb’: US clouds crush European competition on their home turf Feedly Summary: Local providers squeezed out despite market growth, leaving sovereignty hopes in question European cloud infrastructure companies make up just 15 percent of their own market, and the huge investment the US giants can…

  • Slashdot: Women Dating Safety App ‘Tea’ Breached, Users’ IDs Posted To 4chan

    Source URL: https://yro.slashdot.org/story/25/07/25/1934249/women-dating-safety-app-tea-breached-users-ids-posted-to-4chan?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Women Dating Safety App ‘Tea’ Breached, Users’ IDs Posted To 4chan Feedly Summary: AI Summary and Description: Yes **Summary:** The text describes a significant data breach involving the Tea app, which has exposed sensitive user data, including selfies and driver’s licenses, leading to privacy concerns and regulatory implications. This…

  • The Register: Microsoft admits it ‘cannot guarantee’ data sovereignty

    Source URL: https://www.theregister.com/2025/07/25/microsoft_admits_it_cannot_guarantee/ Source: The Register Title: Microsoft admits it ‘cannot guarantee’ data sovereignty Feedly Summary: Under oath in French Senate, exec says it would be compelled – however unlikely – to pass local customer info to US admin Microsoft says it “cannot guarantee" data sovereignty to customers in France – and by implication the…

  • The Register: Dell scoffs at breach, says miscreants only stole ‘fake data’

    Source URL: https://www.theregister.com/2025/07/21/dell_scoffs_at_breach/ Source: The Register Title: Dell scoffs at breach, says miscreants only stole ‘fake data’ Feedly Summary: No customer, partner info stolen, spokesperson tells The Reg Dell has confirmed that criminals broke into its IT environment and stole some of its data — but told The Register that it’s “primarily synthetic (fake) data."… AI…

  • Cloud Blog: Engineering Deutsche Telekom’s sovereign data platform

    Source URL: https://cloud.google.com/blog/topics/customers/engineering-deutsche-telekoms-sovereign-data-platform/ Source: Cloud Blog Title: Engineering Deutsche Telekom’s sovereign data platform Feedly Summary: Imagine transforming a sprawling, 20-year-old telecommunications data ecosystem, laden with sensitive customer information and bound by stringent European regulations, into a nimble, cloud-native powerhouse. That’s precisely the challenge Deutsche Telekom tackled head-on, explains Ashutosh Mishra. By using Google Cloud’s Sovereign…

  • CSA: Compliance: Cost Center or Growth Trigger?

    Source URL: https://prescientsecurity.com/blogs/compliance-cost-center-or-growth-trigger Source: CSA Title: Compliance: Cost Center or Growth Trigger? Feedly Summary: AI Summary and Description: Yes **Summary:** The text discusses the importance of compliance for startups, particularly in the context of security and sales growth. It emphasizes that compliance shouldn’t be viewed merely as a regulatory burden but as a strategic asset…

  • Slashdot: German Court Rules Meta Tracking Tech Violates EU Privacy Laws

    Source URL: https://yro.slashdot.org/story/25/07/10/2056216/german-court-rules-meta-tracking-tech-violates-eu-privacy-laws?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: German Court Rules Meta Tracking Tech Violates EU Privacy Laws Feedly Summary: AI Summary and Description: Yes Summary: A recent ruling by the Regional Court of Leipzig in Germany requires Meta to pay $5,900 to a Facebook user for data privacy violations linked to its tracking technologies. This decision…

  • CSA: How Your Zero Trust Environment Affects Compliance

    Source URL: https://www.schellman.com/blog/cybersecurity/what-is-zero-trust-security-audit Source: CSA Title: How Your Zero Trust Environment Affects Compliance Feedly Summary: AI Summary and Description: Yes **Summary:** The text explores the concept of Zero Trust (ZT) architecture in cybersecurity, discussing its implications for compliance assessments within organizations. It highlights the advantages of ZT, such as enhanced data protection and access controls,…