You are here
Home > Author: Peter Glock

Statement to issue the Age Appropriate Design Code

“The Age Appropriate Design Code has completed the Parliamentary process and is being issued by the ICO today, 12 August 2020. The Code will come into force in 21 days on 2 September. The code then provides a transition period of 12 months, to give online services time to conform.”

Senator calls for Google to ban TikTok after allegedly tracking user data

I'd make a different call: enforce the policies already in place on the Google and Apple app stores and see how many apps get removed...: The tactic was reportedly hidden using an additional layer of encryption, and was done without the knowledge of TikTok users. The company reportedly ended the practice in November. "We are committed to protecting the privacy and safety of the TikTok community," a TikTok representative said. "We constantly update our app to keep up with

Police use of facial recognition violates human rights, UK court rules

Push back against the 'China-fication' of UK law enforcement...: Enlarge / A close-up of a police facial recognition camera in use at the Cardiff City Stadium on January 12, 2020 in Cardiff, Wales. Police used the technology to identify individuals who were issued with football banning orders in an attempt to prevent disorder. Critics argued that the use of such technology is invasive and discriminatory. (credit: Matthew Horwood | Getty Images) Privacy advocates in ...

Developers Need More Usable Static Code Scanners to Head Off Security Bugs

My advice is to invest in your threat modelling process and tools to get a better return from 'shifting-left', especially given how unusable the lower level tools seem to be...: [...] The research comes as developers are increasingly being tasked with taking responsibility for the security of their code, often by getting earlier results of security analyses as they write their code. The simplest form of such tools are linters — named after "lint," a Unix-based code scanner...

Announcing the Expansion of the Clean Network to Safeguard America’s Assets

One of my friends pointed this press statement out to me. No attempt at diplomatic language here. The US is signalling the ramp up to all out infowar with China...: The Clean Network program is the Trump Administration’s comprehensive approach to guarding our citizens’ privacy and our companies’ most sensitive information from aggressive intrusions by malign actors, such as the Chinese Communist Party (CCP). Today, I am announcing the launch of five new lines of effort to pr

NSW Police says domestic carriers complying with encryption laws but internationals are not

For the moment compliance is voluntary. I'm interested to see how the Australians intend to compel international service providers to comply in future...: [...] Fitzgerald said TOLA has "positively" impacted the relationships between NSW Police and some DCPs, calling it an effective tool to drive engagement and confrontation. Globally, however, discussions and interactions were not so constructive or helpful. "Our experience with engaging some overseas designated commu

What A Security Engineer & Software Engineer Learned By Swapping Roles

I too have experience of changing roles. For one startup I'm the DPO, focused on data privacy issues and spending most of my time on working with customers and suppliers on compliance and audit issues. For other contracts I'm the 'security guy' who has to design and implement the controls that protect data. But the most challenging role change is as CTO where the priority is to get to market quickly...: Security engineering and software engineering teams have much to learn...