New Zealand’s leading cyber security lab works to return control of your data to you.
CROW presents research findings in Tonga
Siuta Laulaupea’alu presented his thesis on Data Security Assessment for the Government Information Systems in Tonga to more than 20 Information System personnel from line ministries and agencies
ISO/IEC JTC 1/SC 27
SC 27 develops key cyber security industry international standards such as the ISO/IEC 27000 series of standards used by organisations globally. Attended by national delegates from all participating and observing ISO member countries and organisations, this is the first time this global event is held in New Zealand and it is co-organised by the Cyber Security Researchers of Waikato and the Cloud Security Alliance.
18 - 25 April
Why we need a remote kill switch for our online data
"Do users have control over their data on the internet?" Technically, the short answer is "no". And that raises the next question: "Can users have control over their data on the internet?"
An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking
User-centric Visualization of Data Provenance with Gestalt Principles
The Data Privacy Matrix
Towards a Global Alignment of Data Privacy Laws
Progger (Provenance Logger) is a kernel-space logger designed to track data activity in Cloud systems.