newsFacebook tops security ratings among social networksEnterprise-grade authentication remains an Achilles heel of the social media world, but security is improving in other areas, according to a report by access management provider Cerby.By Jon GoldNov 07, 20233 minsInternet SecurityIdentity and Access ManagementPrivacy news Online Safety Bill passes final parliament debate, set to become UK lawBy Michael HillSep 20, 20233 minsEncryptionCompliancePrivacyanalysis The 15 biggest data breaches of the 21st centuryBy Michael Hill and Dan SwinhoeNov 08, 202214 minsData BreachPhishingRSA Conference news analysisFTC files lawsuit against Kochava for harvesting and selling geolocation dataBy Christopher Burgess Aug 30, 20225 minsPrivacy news analysisFTC begins sweeping commercial surveillance and lax data security rulemaking processBy Cynthia Brumfield Aug 11, 20228 minsData PrivacyPrivacy opinionHiQ v LinkedIn court ruling will have a material effect on privacyBy Christopher Burgess Jun 01, 20225 minsCSO and CISOData PrivacyPrivacy news analysisData protection concerns spike as states get ready to outlaw abortionBy Cynthia Brumfield May 23, 20229 minsData PrivacyPrivacy featureHow GDPR has inspired a global arms race on privacy regulationsBy Rosalyn Page Apr 07, 20228 minsRegulationData PrivacyPrivacy featureThe state of privacy regulations across AsiaBy Rosalyn Page Apr 03, 20229 minsRegulationData PrivacyPrivacy Articlesnews analysisUK orgs urged to clean up cookies as enforcement heats upIncreasing focus on enforcement of EU cookie regulations highlights importance of compliance for organisations to avoid fines, lawsuits, and impact on cybersecurity.By Michael Hill Jun 07, 2021 6 minsRegulationGDPRData Privacyfeature21 best free security toolsCheck out these free, standout software tools that will make your daily security work easier, whether it's pen-testing, OSINT, vulnerability assessment, and more.By Peter Sayer and Bill Brenner Apr 20, 2021 15 minsApplication SecurityCloud SecurityData and Information Securityfeature10 pioneering women in information securityAs Women's History Month comes to close, we introduce you (hopefully not for the first time) to some women who broke new ground in infosec, national security, and computer science.By Deb Radcliff Mar 30, 2021 7 minsWomen in ITDiversity and InclusionEncryptionfeatureThe 7 deadly sins of records retentionRecord retention is both a fact of life and a growing headache for organizations burdened by a spiraling number of regulations and legal obligations. Here are worst (and best) practices for securing data and documents.By John Edwards Mar 23, 2021 6 minsGovernmentData and Information SecurityPrivacyfeatureThe HITECH Act explained: Definition, compliance, and violationsMany of the rules and fines we associate with HIPAA were rolled out with the HITECH Act in order to make electronic health records a safe reality.By Josh Fruhlinger Feb 18, 2021 9 minsRegulationElectronic Health RecordsHealthcare IndustryopinionThe most important cybersecurity topics for business executivesData privacy, current cyberthreats, and cybersecurity culture and training top the list, but are these the right priorities?By Jon Oltsik Feb 10, 2021 4 minsRegulationCyberattacksCybercrimefeatureCOPPA explained: How this law protects children’s privacyThe Children's Online Privacy Protection Act places strict limits on what you can do with data about kids younger than 13. Here's how to know if it applies to your organization and how to be compliant.By Josh Fruhlinger Feb 08, 2021 11 minsRegulationInternetPrivacyfeature12 new state privacy and security laws explained: Is your business ready?States from Maine to California have recently enacted privacy, data security, cybersecurity, and data breach notification laws. We break down what each of these laws entails.By Cynthia Brumfield Dec 28, 2020 15 minsData BreachData PrivacyData and Information SecurityfeatureGLBA explained: What the Graham-Leach-Bailey Act means for privacy and IT securityThis banking regulatory act has an infosec reach that goes far beyond the financial services industry.By Josh Fruhlinger Dec 17, 2020 10 minsRegulationData and Information SecurityPrivacynews analysisThe road to a data breach is paved with good intentionsAustralian travel agent’s woes are a reminder that privacy policies don’t automatically let you share customer data, even for well-intentioned efforts.By David Braue Dec 13, 2020 4 minsData BreachPrivacySecuritynews analysisNew AI privacy, security regulations likely coming with pending federal, state billsCISOs should prepare for new requirements to protect data collected for and generated by artificial intelligence algorithms.By Cynthia Brumfield Dec 08, 2020 6 minsData PrivacyCompliancePrivacynews analysisPassage of California privacy act could spur similar new regulations in other statesVoters approved the California Privacy Rights and Enforcement Act (CPRA), which in part limits how organizations can use personal data. Legal experts expect other states to follow suit.By Cynthia Brumfield Nov 12, 2020 5 minsData PrivacyCompliancePrivacy Show more Show less View all Resources whitepaper 5 Myths that May Drive DOD Users to Rely On Unapproved Apps Why do some DOD users rely on unsecure consumer communications and collaboration apps? Because they need to communicate and collaborate to do their jobs, and the convenience and ease of using consumer apps seems like the only way to do that. The post 5 Myths that May Drive DOD Users to Rely On Unapproved Apps appeared first on Whitepaper Repository. By AWS Wickr 13 Oct 2023Cloud SecurityGovernment ITPrivacy View all Video on demand videoAligning security, compliance and privacy across inventory trackingBrad Wells, Executive Director, Information Security, and Kandice Samuelson, Senior Director, IT Governance at PPD lead a team enhancing PPD’s inventory tracking system that identifies PPD's most valuable assets. Join us to learn how they distribute security resources for appropriate levels of protection, maintain compliance with government regulations and industry standards, and leverage information security controls aligned with client requirements, industry frameworks and privacy regulations. May 28, 2021 20 minsComplianceData and Information SecurityPrivacy How the California Consumer Privacy Act (CCPA) will affect you and your business | TECH(talk) Sep 06, 2019 23 minsData PrivacyGDPRGovernment 6 security reasons to upgrade to Windows 10 Jul 25, 2018 1 minsApplication SecurityPrivacyWindows Prepping for GDPR May 18, 2018 36 minsRegulationPrivacySecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Is China waging a cyber war with Taiwan? By Gagandeep Kaur Dec 01, 20234 mins CyberattacksGovernmentGovernment news Apple patches info-stealing, zero day bugs in iPads and Macs By Shweta Sharma Dec 01, 20233 mins Zero-day vulnerability feature The CSO guide to top security conferences By CSO Staff Dec 01, 20236 mins Technology IndustryIT SkillsEvents podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape Oct 10, 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication Nov 06, 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome Oct 16, 202315 mins CSO and CISO