The recent proposed rules over artificial intelligence (AI) in the European Union (EU) are a harbinger of things to come. Data privacy laws are becoming more complex and growing in…
Browsing CategoryData Privacy
California v. Congress: Data Protection Law Showdown
When it comes to data protection laws, the United States has long lagged behind Europe, whose General Data Protection Regulation (GDPR) came into effect in 2018 as the gold standard…
How the CCPA is Shaping Other State’s Data Privacy
Privacy laws are nothing new when it comes to modern-day business. However, since the global digitization of data and the sharing economy took off, companies have struggled to keep up…
What Can We Learn From Recent Cyber History?
The Center for Strategic and International Studies compiled a list of significant cyber incidents dating back to 2003. Compiling attacks on government agencies, defense and high-tech companies or economic crimes…
Modern Data Security Needs a Modern Solution
The role of a data security analyst isn’t an easy one. It has always been hard to address data security because of the volume, speed and variety of data in…
How to Prepare for and Respond to a Data Privacy Breach
Before I started covering cybersecurity, I thought the term ‘breach’ had a single meaning — that an attacker stole data from a computer system. I also thought all the different…
Technologies Useful In the Pandemic Are Challenging Privacy Now
Your company likely made many quick decisions back in March 2020. As an IT leader, you provided the tools employees needed to stay productive while working remotely. It had to…
What You Need to Know About Data Encryption Right Now
You might feel like you’ve heard these imperatives a million times: “You need to encrypt your data.” “Your information isn’t secure unless you encrypt it.” “You need to eat your…
IoT Security: Are Personal Devices Dragging Your Work Network Down?
How many connected devices have you added to your household since March 2020? Be sure to count fitness trackers, speakers, gaming machines and even your Tesla, if there’s one in…
Database Security Best Practices: The Essential Guide
In 2021, an F-35 fighter jet is more likely to be taken out by a cyberattack than a missile. In the digital age, the threat of an attack is everywhere…