News

Thought Leadership

Our impactful approach is driven by our unique perspective.

Kenneth Holley Kenneth Holley

Digital Footprint Reduction: A Roadmap for Sustainable Data Privacy

In our increasingly interconnected world, managing an organization's digital footprint has become paramount. A digital footprint, encompassing everything from email communications to social media interactions, poses significant risks if left unchecked. By adopting sustainable practices like data minimization, robust security measures, and sustainable IT infrastructure, organizations can reduce their footprint, enhance data privacy, and meet regulatory standards. Discover how to navigate and minimize your digital footprint for a secure, compliant, and sustainable digital presence.

Read More
Kenneth Holley Kenneth Holley

Mastering Data Privacy: A Guide for C-Suite Executives

In an era where digital footprints are as critical as physical presence, C-suite executives stand at the forefront of a transformative shift. Their leadership is not just about steering companies through the present but safeguarding their future in a data-centric world. This article offers a deep dive into the essence of data privacy and security, framing it not as a compliance checkbox but as a strategic cornerstone for sustainable growth, customer trust, and competitive advantage. It's a call to action for executives to embody and drive a culture where data privacy is a shared value and responsibility, illuminating the path towards achieving excellence in digital stewardship.

Read More
Kenneth Holley Kenneth Holley

The Ethical Dimensions of Cybersecurity: Navigating Data Protection and Business Interests

In an era where digital interactions are woven into the fabric of daily life, the ethical nuances of cybersecurity have come to the forefront, demanding careful consideration. At the heart of this discourse lies the intricate interplay between organizations' data safeguarding responsibilities and the ethical considerations that accompany data collection and monetization.

Read More
Kenneth Holley Kenneth Holley

ChatGPT In The Office: 6 Tips For Using ChatGPT At Work

The rapid advancement of artificial intelligence (AI) technologies has brought about an era of unprecedented efficiency and innovation. Leading this revolution is OpenAI's ChatGPT, a language model capable of understanding and generating human-like text. As business leaders, we cannot afford to ignore the transformative potential of this technology. Yet, as with any powerful tool, the use of ChatGPT comes with its own set of challenges—specifically regarding cybersecurity. But fear not, for we have the power to harness the benefits of this technology while keeping our data and systems secure.

Read More
Kenneth Holley Kenneth Holley

The Surveillance State – Privacy Rights and the Quest for Public Safety

In August, 2022 the Electronic Frontier Foundation (EFF) reported on its investigation into Fog Reveal, a tool used by police to search large amounts of location data to surveil suspects without a search warrant. Fog Data Science, the company behind the Fog Reveal technology, purchases geolocation data from around 250 million devices collected by tens of thousands of apps, then aggregates the data into a searchable database containing what the company claims amounts to "hundreds of billions of records." Fog uses advertising identification numbers (Ad Ids) to target a person's location and interests, and claims the data is anonymized.

Read More
Kenneth Holley Kenneth Holley

New Trade Regulation Rules - The Quest for Data Privacy and Security

Expansive commercial surveillance practices, poor data security, and the absence of uniform and comprehensive privacy and date security protections prompted the Federal Trade Commission (FTC) to publish an advance notice of proposed rulemaking (ANPR) and request public comment on the pervasiveness of commercial surveillance and data security practices that harm consumers. The FTC recently extended the deadline for comments. Silent Quadrant previously provided comment and this note summarizes some key points.

Read More