IT Security & Privacy

When Data Becomes a Product: Privacy, Cybersecurity, & the Economics of Information

Data is a constant subject of discussion in the context of security. Custody of personal data is heavily regulated, and systems are designed to protect anonymity, even though it can never be fully guaranteed. Security breaches are costly, not only because of the breach itself, but because of the scrutiny and liability that follow. As a result, privacy has increasingly become a value proposition for products and services that collect and retain personal information.

CNIL Fines Mobius Solutions €1 Million Over Deezer Data Breach

France’s data protection authority has fined Mobius Solutions €1 million after finding that the company, acting as a processor for music-streaming platform Deezer, failed to comply with core GDPR obligations tied to subcontracting and data handling.

Croatia’s Data Protection Authority Fines Bank €1.5 Million Over Mobile Banking Privacy Violations

Croatia’s Personal Data Protection Agency has imposed an administrative fine of €1.5 million on a bank for multiple violations of the General Data Protection Regulation, following findings that the institution unlawfully collected extensive personal data from users of its mobile banking application.

Data Brokers Face Renewed Scrutiny from California Before Registration Deadline

California’s privacy regulator is sharpening its focus on data brokers that may be obscuring their identities or relying on corporate affiliations to sidestep registration requirements, as a new consumer deletion platform prepares to go live in 2026.

Privacy Concerns Persist as TikTok Continues EU Data Transfers to China

The Netherlands’ data protection authority has warned users and organizations to think carefully before continuing to use TikTok, after confirming that the platform is still transferring personal data of European users to China despite a joint finding by EU privacy regulators that such transfers are unlawful under the GDPR.

Why Governance Tools Miss What Hackers Exploit

SAP systems store sensitive business data, run mission-critical processes, and ensure that operations continue uninterrupted. However, having the SAP GRC product suite or similar governance, risk, and compliance tools does not cover all aspects of system security. Relying on them to keep you safe is a recipe for infiltration.

SoundCloud Data Breach Triggers Service Disruptions & Raises Questions About Incident Response Controls

SoundCloud has confirmed with Bleeping Computer that a recent wave of service outages and access issues stemmed from a security incident that exposed a subset of user data, as the company moved to contain unauthorized access to parts of its infrastructure.