Why supply chain security is essential to digital transformation [Q&A]
As digital transformation projects mean enterprises are sharing more and more information with customers and suppliers, added focus is placed on the security of that data.
To find out how companies can address this, while still reaping the benefits of AI, IoT and other fast growing technologies, we spoke to Fouad Khalil, VP of compliance at SecurityScorecard.
Consumers worry their data is being held by brands they don't know
The average person's data is held by 350 brands and they probably don't remember 83 percent of them according to a new study.
The research from identity management platform Mine also finds 32 percent of data in people's 'digital footprint' didn’t even require users to open an account to store their information.
How DevOps can better communicate with the business
Business leaders rely on business intelligence. This is underpinned by the hard work of their DataOps teams who ensure the complicated connections of the data science BI processes keep flowing. Given the centrality of data to the whole process, the technical team cannot be expected to manage this without getting business leadership to first understand just what effective DataOps entails. In failing to do so, friction grows as strategic direction meets the physical limits of technology, time, skills, and budget. The fundamental promise of big data and data processing is to provide organizations with the insights to make more intelligent decisions. Yet, only infrequently do we see organizations focusing on how they can collect their data as much as they focus on how they can act on it. In other words, they don’t give due consideration to the data they have about... well... collecting data. This appears an oversight given how much of a game-changer these insights can be in terms of operations, reliability and optimizing resource use.
Before diving into how we can collate and make use of this data, however, it is instructive to look at what kind of inputs can be collected on data processing and storage. These, if used properly, can drastically improve processes and improve workload management.
What impact will a Data Protection Act have in the US? [Q&A]
The US Congress is currently considering whether to pass a bill to create a Data Protection Act which would set up a federal data protection agency.
The bill, introduced last month, spells out how the agency would enforce data protection and privacy rights, putting Americans in control of their own data. But what exactly does that mean? And how would a bill with the sole goal of protecting individuals’ data effect the tech, financial and healthcare industries?
CCPA is a journey, not a destination
It’s been over a month since CCPA was implemented and businesses are struggling to comply. Smart organizations, however, know that compliance doesn’t have to be a sunk cost; in fact, it can be used as a competitive differentiator. Instead of playing catch up with global, national, and state data privacy regulations, businesses should consider implementing broad policies and protections for consumer information that will prepare the organization for any future legislation.
For all the criticisms of GDPR -- and there are many -- the EU legislation set an important precedent for data privacy laws internationally. Businesses that are already GDPR-compliant are in a good position to satisfy requirements from new national and state data privacy laws.
Increased security investments aren't stopping data breaches
Companies are putting more resources into security technologies to detect and respond quickly to a data breach, but the number of breaches is still increasing according to a new report.
The latest annual corporate preparedness study from Experian, based on research carried out by the Ponemon Institute, shows 68 percent of respondents are putting more resources into security, with 57 percent also reporting that they believe their data breach response plans are 'very' or 'highly' effective, up from 49 percent in 2018.
Why data quality is essential to cloud migration [Q&A]
Migrating to the cloud is an increasingly popular option for businesses, but to be successful the data involved needs to be in good shape.
We spoke to Kevin Kline, principal program manager at SentryOne, to find out why the quality of data is so essential to successful migration and what businesses need to do to ensure their migration succeeds.
Brexit pushes Google to move UK user data away from Europe to the US
Google has confirmed that it plans to move data pertaining to its UK users out of Europe, and will instead store user accounts in the US.
The move comes as a result of the UK's departure from the European Union, and it is a side effect of Brexit that few would have predicted. Reuters reports that Google will be placing UK user accounts under US jurisdiction, adding that it "will leave the sensitive personal information of tens of millions with less protection and within easier reach of British law enforcement".
The challenges of compliance in an as-a-service world
Software-as-a-service (SaaS) is rapidly replacing applications that were once hosted on-premises. There are compelling reasons for switching to SaaS. Costs are lower, there’s no in-house equipment or software to deal with, and no updates or patches to manage. Organizations are obviously aware of the advantages. Experts at Gartner estimate that SaaS global revenue will exceed $94 billion in 2019, up 18.5 percent over 2018. The outlook for future growth is even more promising, with projections that revenue will soar to $143.7 billion by 2022.
But the as-a-service model raises a critical issue facing organizations: compliance with GDPR, HIPAA, the California Consumer Privacy Act (CCPA), Sarbanes-Oxley and other regulatory schemas that govern company data. Who owns the data and is responsible for compliance? What should customers expect from SaaS vendors?
Selectively revealing yourself to the world -- Privacy in the 21st century
Fifteen years ago, if you wanted to join Facebook (then The FaceBook), you needed a valid college email address and the site did not offer much more than study group meetups or a place to chat and share pictures with high school friends. Today, Facebook is a juggernaut with roughly 2.5 billion monthly active users -- and as one of the world’s largest ad platforms, the amount of data it has on its users is staggering. But in 2018, the Cambridge Analytica breach profoundly shook users’ confidence in the social network -- and the entire tech industry as well. Since the scandal, there have been Congressional hearings, lawsuits, antitrust concerns and even the complete demise of Cambridge Analytica. But the questions did not end there -- consumers began to question how all big tech used their data. Why does Google track people’s location even if they have turned tracking off? Is Alexa recording my private conversations?
Thanks to the fallout from the Cambridge Analytica scandal, and the endless stream of data sharing scandals since, consumers are more aware of their online privacy and are beginning to question how companies are monetizing their data. Let’s look at how the rise of social media created this data economy, the tech industries attempt to regulate itself and how the U.S. government is woefully unprepared to address modern privacy challenges. How do we progress in a world where every detail of our days are tracked?
Cyber insurance and its place in business security strategy [Q&A]
Data breaches and cyberattacks can be costly for businesses, not just in financial terms but also in damage to reputation.
It's not surprising then that more and more companies are looking to offset these costs by taking out cyber insurance policies, We spoke to Chris Kennedy, CISO and VP of customer success at AttackIQ to find out more about cyber insurance and the potential pitfalls.
What impact will the Cybersecurity State Coordinator Act have? [Q&A]
The US is currently considering new legislation that would require each state to appoint a cybersecurity leader.
The proposed Cybersecurity State Coordinator Act has cross-party support and would, say its backers, improve intelligence sharing between state and federal governments and speed up incident response times in the event of a cyberattack.
Avast apologizes for selling user data and shuts down its marketing analytics subsidiary Jumpshot with immediate effect
Avast has been facing growing criticism following an investigation by Motherboard and PCMag that revealed the company’s free antivirus software was harvesting user data and selling it onto marketers.
In a bid to appease users, Avast published a blog post explaining why it was collecting user data, and announced that going forward this collection would be opt-in, but that the company would continue to sell the data via its analytics subsidiary Jumpshot. Throughout the post the security firm insisted that collected data was fully "de-identified", despite the fact that Motherboard and PCMag’s investigation showed how it could be linked back to an individual.
Why everyone needs to be speaking the same language on data privacy [Q&A]
Today is Data Privacy Day and with CCPA coming into force at the start of this month, the focus is very much on personal data, how it's used and how it needs to be protected.
One of the issues is that there are lots of definitions and terms involved which means it’s vital that everyone understands what they’re dealing with.
Businesses gain from strong data privacy practices
Data privacy is very much in people's minds at the moment with the introduction of CCPA and other legislation around the world.
Businesses can sometimes see privacy regulations as a necessary evil that they have to comply with, but new data from Cisco reveals growing, tangible benefits for businesses that adopt strong privacy practices.
Recent Headlines
Most Commented Stories
Windows 12.1 is everything Windows 11 should be -- and the Microsoft operating system we need!
Apple Intelligence will launch in beta and that’s unacceptable for a trillion-dollar company
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.