Regulation

Regulation | News, how-tos, features, reviews, and videos

globe

Why Africa’s private sector should be concerned about more than the GDPR

The European Union General Data Protection Regulation (GDPR) has generated strong interest in Africa’s private sector. However, the bigger picture shows massive gaps across Africa’s data privacy landscape. This article highlights some...

us eu flag

The GDPR initiative and how it affects US government and industry

Don't make the mistake of thinking the GDPR regulation only affects our friends and neighbors overseas. There may be real implications here at home.

MyHeritage HQ

92 million MyHeritage email addresses found on private server

On Monday, MyHeritage, an online genealogy platform, announced that more than 90 million of their users had email addresses and hashed passwords compromised, after a researcher discovered a file being hosted on a private server.

Government building with greek columns

How GDPR impacts US cybersecurity policy

With the GDPR in full effect, expect to start seeing an impact in the US sooner vs. later. All it will take is the next major data breach for the American public to start demanding ownership of their personal data.

vulnerable gdpr breach security cyber attack

GDPR is here – now what?

Look at the General Data Protection Regulation (GDPR) and the revised Payment Services Directive (PSD2) as opportunities to adopting sound data protection practices.

login password - user permissions - administrative control

Are regulations keeping you from using good passwords?

Most companies are using password "best practices" that are out of date and ineffective. Regulations are getting in the way of changing them.

10 small business security

How GDPR will affect small and midsized businesses

GDPR went into effect May 25th and many small- to medium-sized businesses will be impacted whether they realize it or not. Although daunting, here are a few steps your company can take to be better prepared.

Data science

Data is the new air

Data is a catalyst of innovation, of disruption and of possibilities. However, we still need to learn how to harness data and the internet for positive benefit. In the data we generate, there also is great risk. We need to understand...

sunset ocean horizon solar

The GDPR is a journey, not a destination

Make sure you understand the need to operationalize data management and security.

eye on computer monitor showing privacy security or breach

How privacy is moving data security to the top of corporate agendas

It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.

Android Smart Lock Trusted Places

Zero Trust: Why ‘cyber insurance’ offers no GDPR compliance

With the finable GDPR compliance deadline just weeks away, the vultures are circling – and leading the pack is a group of companies touting so-called ‘cyber insurance’. While the majority of IT security vendors are opting to scare...

vulnerable gdpr breach security cyber attack

Salted Hash Ep 28: GDPR deadline fast approaches

The deadline for the General Data Protection Regulation (GDPR) is almost here. During our trip to the RSA Conference last month, Salted Hash spoke to an expert on the subject, and learned some interesting things when it comes to...

11 regulations

What small business owners should know about GDPR and why

The General Data Protection Regulation (GDPR) goes into force May 25, 2018. Learn what small-business owners need to know about GDPR and why it matters.

11 regulations

Why mid-market companies face a tougher road with the GDPR

The rules and potential penalties of the GDPR will not fit all sized companies.

vulnerable gdpr breach security cyber attack

GDPR: one size does not fit all

Why mid-market companies face a tougher road with GDPR.

supply chain

DOD releases new guidance to protect data within the supply chain

Companies supplying products and services to the US Department of Defense must meet 110 security requirements specified in NIST SP 800-171 or risk losing contract awards through a new set of risk scoring guidelines. The new rules...

vulnerable gdpr breach security cyber attack

Rights management and the GDPR: users are still in the loop

Using Information Rights Management (IRM) to manage the General Data Protection Regulation (GDPR).

draft eprivacy regulation   privacy by design

Data and privacy breach notification plans: What you need to know

Failure to report breaches within the rules of the many global data and privacy protection regulations can result in penalties. Planning ahead will help avoid that.

vulnerable gdpr breach security cyber attack

GDPR compliance in a nutshell

Time to figure out how to manage your enterprise's compliance with the General Data Protection Regulation (GDPR).

healthcare security

Is your organization a HITRUST org?

For good reason, there's now more focus on regulatory compliance for healthcare—which also includes a multitude of vendors and business associates to manage risk for and meet or exceed the Health & Human Services (HHS) compliance...

Load More