Search Results for: gdpr

Why supply chain security is essential to digital transformation [Q&A]

supply chain

As digital transformation projects mean enterprises are sharing more and more information with customers and suppliers, added focus is placed on the security of that data.

To find out how companies can address this, while still reaping the benefits of AI, IoT and other fast growing technologies, we spoke to Fouad Khalil, VP of compliance at SecurityScorecard.

Continue reading

Consumers worry their data is being held by brands they don't know

personal data

The average person's data is held by 350 brands and they probably don't remember 83 percent of them according to a new study.

The research from identity management platform Mine also finds 32 percent of data in people's 'digital footprint' didn’t even require users to open an account to store their information.

Continue reading

How DevOps can better communicate with the business

DevOps

Business leaders rely on business intelligence. This is underpinned by the hard work of their DataOps teams who ensure the complicated connections of the data science BI processes keep flowing. Given the centrality of data to the whole process, the technical team cannot be expected to manage this without getting business leadership to first understand just what effective DataOps entails. In failing to do so, friction grows as strategic direction meets the physical limits of technology, time, skills, and budget. The fundamental promise of big data and data processing is to provide organizations with the insights to make more intelligent decisions. Yet, only infrequently do we see organizations focusing on how they can collect their data as much as they focus on how they can act on it. In other words, they don’t give due consideration to the data they have about... well... collecting data. This appears an oversight given how much of a game-changer these insights can be in terms of operations, reliability and optimizing resource use.

Before diving into how we can collate and make use of this data, however, it is instructive to look at what kind of inputs can be collected on data processing and storage. These, if used properly, can drastically improve processes and improve workload management.

Continue reading

What impact will a Data Protection Act have in the US? [Q&A]

data protection jigsaw

The US Congress is currently considering whether to pass a bill to create a Data Protection Act which would set up a federal data protection agency.

The bill, introduced last month, spells out how the agency would enforce data protection and privacy rights, putting Americans in control of their own data. But what exactly does that mean? And how would a bill with the sole goal of protecting individuals’ data effect the tech, financial and healthcare industries?

Continue reading

CCPA is a journey, not a destination

Data privacy

It’s been over a month since CCPA was implemented and businesses are struggling to comply. Smart organizations, however, know that compliance doesn’t have to be a sunk cost; in fact, it can be used as a competitive differentiator. Instead of playing catch up with global, national, and state data privacy regulations, businesses should consider implementing broad policies and protections for consumer information that will prepare the organization for any future legislation.

For all the criticisms of GDPR -- and there are many -- the EU legislation set an important precedent for data privacy laws internationally. Businesses that are already GDPR-compliant are in a good position to satisfy requirements from new national and state data privacy laws.

Continue reading

Increased security investments aren't stopping data breaches

data breach cash wall

Companies are putting more resources into security technologies to detect and respond quickly to a data breach, but the number of breaches is still increasing according to a new report.

The latest annual corporate preparedness study from Experian, based on research carried out by the Ponemon Institute, shows 68 percent of respondents are putting more resources into security, with 57 percent also reporting that they believe their data breach response plans are 'very' or 'highly' effective, up from 49 percent in 2018.

Continue reading

Why data quality is essential to cloud migration [Q&A]

Cloud

Migrating to the cloud is an increasingly popular option for businesses, but to be successful the data involved needs to be in good shape.

We spoke to Kevin Kline, principal program manager at SentryOne, to find out why the quality of data is so essential to successful migration and what businesses need to do to ensure their migration succeeds.

Continue reading

Brexit pushes Google to move UK user data away from Europe to the US

EU and US flags

Google has confirmed that it plans to move data pertaining to its UK users out of Europe, and will instead store user accounts in the US.

The move comes as a result of the UK's departure from the European Union, and it is a side effect of Brexit that few would have predicted. Reuters reports that Google will be placing UK user accounts under US jurisdiction, adding that it "will leave the sensitive personal information of tens of millions with less protection and within easier reach of British law enforcement".

Continue reading

The challenges of compliance in an as-a-service world

SaaS

Software-as-a-service (SaaS) is rapidly replacing applications that were once hosted on-premises. There are compelling reasons for switching to SaaS. Costs are lower, there’s no in-house equipment or software to deal with, and no updates or patches to manage. Organizations are obviously aware of the advantages. Experts at Gartner estimate that SaaS global revenue will exceed $94 billion in 2019, up 18.5 percent over 2018. The outlook for future growth is even more promising, with projections that revenue will soar to $143.7 billion by 2022.

But the as-a-service model raises a critical issue facing organizations: compliance with GDPR, HIPAA, the California Consumer Privacy Act (CCPA), Sarbanes-Oxley and other regulatory schemas that govern company data. Who owns the data and is responsible for compliance? What should customers expect from SaaS vendors?

Continue reading

Selectively revealing yourself to the world -- Privacy in the 21st century

Fifteen years ago, if you wanted to join Facebook (then The FaceBook), you needed a valid college email address and the site did not offer much more than study group meetups or a place to chat and share pictures with high school friends. Today, Facebook is a juggernaut with roughly 2.5 billion monthly active users -- and as one of the world’s largest ad platforms, the amount of data it has on its users is staggering. But in 2018, the Cambridge Analytica breach profoundly shook users’ confidence in the social network -- and the entire tech industry as well. Since the scandal, there have been Congressional hearings, lawsuits, antitrust concerns and even the complete demise of  Cambridge Analytica. But the questions did not end there -- consumers began to question how all big tech used their data. Why does Google track people’s location even if they have turned tracking off? Is Alexa recording my private conversations?  

Thanks to the fallout from the Cambridge Analytica scandal, and the endless stream of data sharing scandals since, consumers are more aware of their online privacy and are beginning to question how companies are monetizing their data. Let’s look at how the rise of social media created this data economy, the tech industries  attempt to regulate itself and how the U.S. government is woefully unprepared to address modern privacy challenges.  How do we progress in a world where every detail of our days are tracked?

Continue reading

Cyber insurance and its place in business security strategy [Q&A]

insurance key

Data breaches and cyberattacks can be costly for businesses, not just in financial terms but also in damage to reputation.

It's not surprising then that more and more companies are looking to offset these costs by taking out cyber insurance policies, We spoke to Chris Kennedy, CISO and VP of customer success at AttackIQ to find out more about cyber insurance and the potential pitfalls.

Continue reading

What impact will the Cybersecurity State Coordinator Act have? [Q&A]

US capitol building

The US is currently considering new legislation that would require each state to appoint a cybersecurity leader.

The proposed Cybersecurity State Coordinator Act has cross-party support and would, say its backers, improve intelligence sharing between state and federal governments and speed up incident response times in the event of a cyberattack.

Continue reading

Avast apologizes for selling user data and shuts down its marketing analytics subsidiary Jumpshot with immediate effect

Avast has been facing growing criticism following an investigation by Motherboard and PCMag that revealed the company’s free antivirus software was harvesting user data and selling it onto marketers.

In a bid to appease users, Avast published a blog post explaining why it was collecting user data, and announced that going forward this collection would be opt-in, but that the company would continue to sell the data via its analytics subsidiary Jumpshot. Throughout the post the security firm insisted that collected data was fully "de-identified", despite the fact that Motherboard and PCMag’s investigation showed how it could be linked back to an individual.

Continue reading

Why everyone needs to be speaking the same language on data privacy [Q&A]

data privacy

Today is Data Privacy Day and with CCPA coming into force at the start of this month, the focus is very much on personal data, how it's used and how it needs to be protected.

One of the issues is that there are lots of definitions and terms involved which means it’s vital that everyone understands what they’re dealing with.

Continue reading

Businesses gain from strong data privacy practices

Privacy key

Data privacy is very much in people's minds at the moment with the introduction of CCPA and other legislation around the world.

Businesses can sometimes see privacy regulations as a necessary evil that they have to comply with, but new data from Cisco reveals growing, tangible benefits for businesses that adopt strong privacy practices.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.