dcsimg

SECURITY ARCHIVES

The Burden of State Data Privacy Laws: A Q&A with Robb Reck from Ping Identity

18 Sep, 2018

Robb Reck, cybersecurity expert and CISO of Ping Identity, discusses implications of new privacy acts. For consumers, these acts put a stake in the ground about what is required for organizations doing business; for companies, they add burdens to operating requirements.

Why Dell’s Security Camera IoT Offering Is Doing So Well: It Focuses on Results

07 Sep, 2018

Dell Technologies is so successful with its security effort because of the EMC storage component and the ability to be a general contractor.

Intel Actions on Security/Performance Problems Should Drive Recall and Government Oversight

04 Sep, 2018

Intel has behaved badly around a processor problem, shifting the risk to OEMs and end customers.

Vermont Also Passed a Data Privacy Law

31 Aug, 2018

The new privacy law in Vermont is the first one in the country designed to regulate data brokers, the companies selling our personal information.

Building a Secure HCI Environment

31 Aug, 2018

Security is a key aspect of the new converged environment, but it cannot simply be carried over from legacy systems. HCI is a unique form of infrastructure, and it needs a unique form of protection.

Tech Companies Against California Privacy Act

30 Aug, 2018

The tech industry is making it known that it is not pleased about the California Consumer Privacy Act, and pointing out the ways that it will hurt businesses.

Protecting Consumer Data Requires Understanding Consumer Data

29 Aug, 2018

Unfortunately, many large companies have turned consumers into products rather than selling to them. This approach to data may backfire.

Upping the Ante on Privacy Protections in the U.S.: A Q&A with Jim Varner

24 Aug, 2018

The California Consumer Privacy Act is getting the attention right now, but several states are considering legislation with the goal of protecting consumer information. Jim Varner, president and CEO of SecurityFirst, gives his opinions on where America is heading with privacy protections.

Customer Data Platforms Are One Solution to Meeting New Privacy Regulations

23 Aug, 2018

Organizations can manage growing complexity generated by new privacy regulations like the California Consumer Privacy Act with a Customer Data Platform (CDP).

California Consumer Privacy Act: Its Similarities and Differences from GDPR

17 Aug, 2018

The California Consumer Privacy Act, CCPA, goes into effect on January 1, 2020, and like GDPR, will give users more control over their personal data. Preparations start now.

Why Facebook (and Others) Should Look to IBM to Save Them from Privacy Mistakes

02 Aug, 2018

IBM might be the best source for Facebook or any other company concerned about the potentially terminal exposure of breaching customer trust and violating privacy.

Breaches from Third Parties Are the Costliest

01 Aug, 2018

Third-party security has to be built into your overall security budget, including policies and disaster planning. These breaches are already costing companies a lot of money.

Majority Say Third Parties Lack Security Visibility

31 Jul, 2018

Inadequate visibility into third-party security policies and procedures, not surprisingly, increases risks.

Third-Party Security in a GDPR World

30 Jul, 2018

Ensuring third parties are staying in GDPR compliance is more crucial than ever.

Russians Take Advantage of Third Parties to Hack Utilities

26 Jul, 2018

Using third parties as a way to access larger, more influential targets continues to be a growing threat, including to U.S. utilities.

Working with Third Parties to Decrease Risks: Q&A with Lee Barrett from EHNAC

25 Jul, 2018

Lee Barrett is executive director of EHNAC, a federally recognized standards development organization and accreditation body for health care organizations. EHNAC works directly with third-party vendors across health care to ensure companies are meeting industry standards for processes, privacy and security, regulatory compliance.

Addressing Third-Party Security Risks

24 Jul, 2018

Uniform cybersecurity standards, regulatory requirements, ransomware and back door access methods are all contributing to a complex third-party risk environment.

Free Anti-Phishing Training from Sacha Baron Cohen

17 Jul, 2018

It is a shame that we cannot be more trusting, but the reality is that a lot of people make a living scamming others. The damage is very real.

Strengthening Collaborative Security

16 Jul, 2018

By laying the foundation now so that everybody understands how to manage information collaboratively, organizations can hopefully avert a lot of confusion, and lost productivity, later.

As Americans Learn About GDPR, They Want Their Own Data Privacy

28 Jun, 2018

If companies can afford to protect the privacy of Europeans, they can also afford to do so for their American customers and users.

1|2 | 3 | 4 | 5 | Next » Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.