Privacy

Privacy | News, how-tos, features, reviews, and videos

women spinning plates asynchronous programming synchrony multi tasking by graemenicholson getty ima
library / repository / binders and boxes on shelves in a large archive

Lady Justice statue with scales, law books. [regulation / compliance / legal liability / fairness]

Virginia data protection bill signed into law

The state is the second in the nation to enact a consumer data protection law along the lines of the EU's GDPR. Here's what businesses need to know about Virginia's CDPA.

interconnecting gears / process / automation / machinery / mechanism / efficiency

Inrupt offers a standard for controlling data and identity on the web

Founded by security and web luminaries, Inrupt has commercialized the Solid Project technology to manage sensitive data in a more secure, compliant manner...if enough people buy into its vision.

healthcare data breach / medical patient privacy security violation

The HITECH Act explained: Definition, compliance, and violations

The Health Information Technology for Economic and Clinical Health (HITECH) Act aims to expand the use of electronic health records through incentives to health care providers and consumers. It also tightens rules on providers to...

high priority gauge

The most important cybersecurity topics for business executives

Data privacy, current cyberthreats, and cybersecurity culture and training top the list, but are these the right priorities?

A hand reaches to activate controls marked with gear icons [ process / update / fix / automate ]

How strong, flexible data protection controls can help maintain regulatory compliance

An effective approach to data protection controls embraces ethical standards and anticipates new requirements. Here’s how some CISOs and other experts tackle the issue.

child coder boy with computer gaming children laptop

COPPA explained: How this law protects children's privacy

The Children's Online Privacy Protection Act is a U.S. law that aims to protect the privacy and personally identifying information of children under the age of 13 who use online services.

medical data accessed via tablet / healthcare IoT monitoring

HIPAA explained: definition, compliance, and violations

This landmark law imposes stringent privacy and security mandates on health care providers—and most of their IT vendors.

lock circuit board bullet hole computer security breach

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

abstract data flows / data streams

Differential privacy: Pros and cons of enterprise use cases

Hiding sensitive data in a sea of noise might have more value than encryption in some use cases. Here are the most likely differential privacy applications and their trade-offs.

data security / padlock / binary code / digital display

Data security vs data privacy – they’re not the same thing

Data security and data privacy are both necessary to completely protect corporate data assets. But most companies spend most of their time on the former and much less on the latter.

Compliance

12 new state privacy and security laws explained: Is your business ready?

States from Maine to California have recently enacted privacy, data security, cybersecurity, and data breach notification laws. Let's break down what each of these laws entails and how businesses and consumers are affected.

CCPA | California Consumer Privacy Act  >  Satellite view of California's network of lights / lock

CPRA explained: New California privacy law ramps up restrictions on data use

The California Privacy Rights Act (CPRA) is a new law that toughens some data security requirements, brings California more in line with Europe's General Data Protection Regulation, and creates a new state agency—the California...

wan bank networking finance2

GLBA explained: What the Graham-Leach-Bailey Act means for privacy and IT security

The Graham-Leach-Bailey Act (GLBA) is a 1999 law that allowed financial services companies to offer both commercial and investment banking, something that had been banned since the Great Depression. It has an infosec reach that goes...

Two figures within a data center / server maze, strewn with clouds.

What CISOs need to know about Europe's GAIA-X cloud initiative

A new cloud platform based on "European values" around data sovereignty, data protection and privacy will be an alternative to the likes of AWS or Azure.

ethical ai artificial intelligence algorithms

New AI privacy, security regulations likely coming with pending federal, state bills

CISOs should prepare for new requirements to protect data collected for and generated by artificial intelligence algorithms.

California Consumer Privacy Act  / CCPA  >  State flag superimposed on map and satellite view

Passage of California privacy act could spur similar new regulations in other states

Voters approved the California Privacy Rights and Enforcement Act (CPRA), which in part limits how organizations can use personal data. Legal experts expect other states to follow suit.

tools drill bits toolkit tookapic free cc0 via pexels binary thinkstock

21 best free security tools

Check out these free, standout software tools that will make your daily security work easier.

Tech Spotlight   >   IT Leadership [CSO]   >   A woman shakes hands with another.

The CISO’s newest responsibility: Building trust

Leading CISOs have already embraced the concept of trust as a deliverable and indeed are making it the central theme of their entire security function.

Load More
You Might Also Like