Many security leaders view regulations and internal processes designed to manage and secure data as red tape that hampers innovation. Nothing could be further from the truth.
Many security leaders view regulations and internal processes designed to manage and secure data as red tape that hampers innovation. Nothing could be further from the truth.
Many security leaders view regulations and internal processes designed to manage and secure data as red tape that hampers innovation. Nothing could be further from the truth.
Olivia Solon recently wrote an excellent article in the Guardian covering the use of “pseudo-AI” by tech startups. Pseudo-AI, or human workers performing work eventually intended for ...
If you do business with organizations or individuals in the EU, you have already made significant changes to how you process, manage, and store data of EU residents. Prepare to provide the ...
The challenge for CEOs is going beyond awareness to action Committing to risk management in digital transformation is existential Beyond confidentiality, privacy expectations focus on data ...
Storage Switzerland recently wrote about the need for enterprises to move away from using backup processes for long-term data retention use cases. Backup implementations add value in ...
Vojtěch Sedlák covers four techniques to de-identify data and simple ways journalists can introduce them into their workflows.
We are pleased to share that Azure is the first major US cloud provider to achieve certification as a data processor for the new international standard ISO/IEC 27701 Privacy Information ...
The reason why identifying personal data, or PII, is so difficult is the current technology being used is not designed for the task at hand.
In this special guest feature, Joseph E. Mutschelknaus, a director in Sterne Kessler’s Electronics Practice Group, addresses some of the top data privacy compliance issues that startups ...
Roman Foeckl, founder and CEO of CoSoSys, talks about the growing importance of Data Loss Prevention at both endpoint and development level.
If you team is evaluating privacy-preserving synthetic data, three factors will usually come into consideration: Does synthetic data solve my problem? Does t…
The data privacy landscape is evolving beyond cornerstone legislation such as GDPR and CCPA. In this article, Dale Strickland, marketing coordinator, CurrentWare, explores HRs role in data ...
Prioritizing the data privacy of students, faculty, administration, parents, alumni, and donors may be difficult in today's economic climate, but it i
Instead, the U.S. legislative framework for privacy and information security consists of multiple laws that regulate the private sector primarily on a sector-by-sector basis, with multiple ...
How to Ensure That They Don’t Dampen Innovation By Isaac Kohen, Teramind The implementation of Europe’s expansive General Data Protection Regulation was a clear harbinger that the tech ...
With a clear interrelationship between cybersecurity, big data, and data protection, we outline several best practices for cybersecurity-informed data protection.