The extra-territorial scope of GDPR, and many other regions introducing new data protection and privacy requirements such as The California Consumer Privacy Act (CCPA), means it is essential that privacy decision makers understand the need to have a common approach to dealing with regulations - instead of addressing...
In the past, the relationship between cybersecurity and
privacy has been uneasy and even ill-defined. But today,
in the post-GDPR era, the relationship is clear, and so is
the legal and compliance path forward,
Download this whitepaper to learn more about:
The relationship between security & privacy;
How...
With privacy laws becoming global and mainstream, the concept of "adequate security" is becoming a legal mandate across many verticals. The overlap between privacy and security calls for new ways for these two teams to collaborate, communicate more effectively, and use common tools.
Use this guide to learn the...
The latest edition of the ISMG Security Report features an analysis of why Google was one of the first companies to be hit with a major GDPR fine, plus a global update on GDPR compliance trends and an in-depth report on shifts in malware.
Email is indispensable to financial services. It's also so ubiquitous throughout society that most people take for granted that every email sent will be received almost instantaneously.
This guide shares insights on what is really happening behind the scenes with the industry's most used form of communication, ways...
With major data breaches in the news and high-stakes security regulations in effect - including GDPR and the NIS Directive - CISOs worldwide are scrambling to comply with IT standards and avoid hefty fines. Privileged Access Management (PAM) streamlines compliance and overlaps with the requirements of many...
What makes Industrial Control Systems (ICS) so vulnerable to cyber attack? How does this impact the wider enterprise? With IoT-connected equipment and remote management on the rise, security has never been so important. Privileged Access Management (PAM) secures and controls access to critical Industrial...
Two heavyweight cybersecurity regulations, ISO 27001 and the more recent GDPR, are major concerns for CISOs and IT teams worldwide. Conveniently for CISOs and IT teams, however, the two standards have much in common. Here we offer a cross-mapping of the security requirements of each regulation, and how PAM can help...
The extra-territorial scope of Europe's General Data Protection Regulation (GDPR) is much more applicable to the new global digital markets of the 21st century, and many other countries, regions and states are following the core principles of GDPR and introducing new data protection and data privacy requirements, such...
In the latest edition of the ISMG Security Report, hear prosecutors discuss the indictments of two Iranians in connection with SamSam ransomware attacks. Also: Updates on allegations that Google is violating GDPR and cryptocurrency's impact on crime trends.
We've spent countless hours and dollars getting ready for the arrival of the EU'S GDPR. In the months since, what's actually changed? How have companies reacted? What should we expect going forward in the EU, and in North America? Has it been all bark and no bite? This session will outline how companies dealt with...
On May 25, 2018, per the General Data Protection Regulation (GDPR), organizations with business ties to the European Union needed to comply to GDPR standards. The cost of non-compliance are stiff fines. The GDPR contains nearly 100 separate and nuanced articles that can be difficult to understand even if you are a...
At Infosecurity Europe 2018, Information Security Media Group conducted dozens of video interviews with industry thought leaders. Here are the highlights.
A coding mistake by an electronic health records vendor has resulted in a data breach impacting thousands of United Kingdom patients. But the incident also serves as a reminder to healthcare entities in the U.S. and elsewhere about the variety of data privacy and security risks vendors can pose.
When June arrives in the United Kingdom, that means it's time for the annual Infosecurity Europe conference in London. Here are visual highlights from this year's event, which featured 240 sessions, 400 exhibitors and an estimated 19,500 attendees.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.