GDPR

GDPR Solutions Upcoming Webinars Trade Shows and Events Press Releases Newsletters Blog
GDPR

WDYT? Is the Digital Strip Search Going Too Far?

In New Zealand there is a zest for security. In the past, customs required travelers to provide any electronic devices for search purposes. What they neglected to incorporate into the law was that travelers were required to provide a password, digital fingerprint, or personal identification number (PIN).…

Read More
GDPR - Data Breaches

Prison for Execs for Data Breaches – Gotta Love It!

I love this bill. According to an article in Security Week, Democrat Senator Ron Wyden released a draft bill named the Consumer Data Protection Act of 2018. It aims to give consumers control over their data, including how it’s sold or shared, and gives the US Federal Trade Commission (FTC) the power to issue fines and other penalties.…

Read More
Data Privacy - Concept Searching

Forget About Privacy – Where Are the Robotics Specifications?

Since the approach of the General Data Protection Regulation (GDPR), protecting privacy data has been a popular topic. Not that anything too significant has since been done about it, such as all companies complying, governments cracking the whip at poor managers, or even outrage from hapless victims.…

Read More
Data Discovery and Classification - Think Like a Cybercriminal

Think Like a Cybercriminal

I have been really digging into data discovery and classification – one of our technology partners, Netwrix, has integrated our classification technologies into their Netwrix Auditor product, a visibility platform for user behavior analysis and risk mitigation. I will throw some topics out there, even if your organization is still not at the point of evaluating or purchasing security software.…

Read More
Data Breaches

Where Is the Disconnect? Data Breach? Pocket Change. Victims? Who Cares?

I am continually surprised that US companies have a devil-may-care attitude towards a data breach. New legislation protects all financial companies from having to admit to a data breach, ever, or notifying victims that their personal information was stolen.…

Read More
Data Breach - Concept Searching

Hush, Hush, We Had a Data Breach – Let’s Not Tell Anyone

I am eagerly awaiting the impact of General Data Protection Regulation (GDPR) and the requirement to comply with data breach notification. That should be a good one. Have you ever noticed that companies, particularly US ones, initially claim they don’t know they had a data breach, sometimes for months?…

Read More
Privacy

GDPR Readiness – You’ve Got to Be Kidding Me

I am all for General Data Protection Regulation (GDPR). It has brought the protection of privacy information to the attention of CIOs all over the world. News reports about organizations struggling to comply are disturbing.…

Read More
Discovery, Risk, Insight

Let’s Just Not Tell Anyone Billions of User Records Were Hacked

Poor Yahoo, now Altaba. It was recently fined a whopping $35 million dollars by the Securities and Exchange Commission (SEC), for sitting on its massive data breach for two years. In case you don’t recall the details, dastardly Russian cyberhackers managed to obtain the entire Yahoo database, which contained billions of usernames, email addresses, phone numbers, birthdates, passwords, and security questions.…

Read More
Content Optimization

The Cost of Bad Data – 12 Percent of Your Revenue

If your organization is like most, it has bad data. This usually isn’t considered a priority by CIOs, but more organizations are waking up to the fact that due diligence is required in cleaning up data.…

Read More
Email Security and Risk - Concept Searching

Email Security and Risk

Supposedly, more than 90 percent of cyberattacks start with email. Using my somewhat faulty logic, if you could protect privacy and sensitive information, prevent compliance violations from being created and shared within emails and attachments, guard the information in real time, and train your users to question what they are opening, then cyberattacks should be reduced and you have an extra layer of protection for your data.…

Read More
Next Page »