newsOnline Safety Bill passes final parliament debate, set to become UK lawDespite widespread criticism and scrutiny, the UK government is within touching distance of delivering its controversial new internet safety rules.By Michael HillSep 20, 20233 minsEncryptionCompliancePrivacy analysis The 15 biggest data breaches of the 21st centuryBy Michael Hill and Dan SwinhoeNov 08, 202214 minsData BreachPhishingRSA Conferencenews analysis FTC files lawsuit against Kochava for harvesting and selling geolocation dataBy Christopher BurgessAug 30, 20225 minsPrivacy news analysisFTC begins sweeping commercial surveillance and lax data security rulemaking processBy Cynthia Brumfield Aug 11, 20228 minsData PrivacyPrivacy opinionHiQ v LinkedIn court ruling will have a material effect on privacyBy Christopher Burgess Jun 01, 20225 minsCSO and CISOData PrivacyPrivacy news analysisData protection concerns spike as states get ready to outlaw abortionBy Cynthia Brumfield May 23, 20229 minsData PrivacyPrivacy featureHow GDPR has inspired a global arms race on privacy regulationsBy Rosalyn Page Apr 07, 20228 minsRegulationData PrivacyPrivacy featureThe state of privacy regulations across AsiaBy Rosalyn Page Apr 03, 20229 minsRegulationData PrivacyPrivacy news analysisWhat will the Australian privacy law review deliver?By Rosalyn Page Apr 03, 20228 minsRegulationData PrivacyPrivacy Articlesfeature21 best free security toolsCheck out these free, standout software tools that will make your daily security work easier, whether it's pen-testing, OSINT, vulnerability assessment, and more.By Peter Sayer and Bill Brenner Apr 20, 2021 15 minsApplication SecurityCloud SecurityData and Information Securityfeature10 pioneering women in information securityAs Women's History Month comes to close, we introduce you (hopefully not for the first time) to some women who broke new ground in infosec, national security, and computer science.By Deb Radcliff Mar 30, 2021 7 minsWomen in ITDiversity and InclusionEncryptionfeatureThe 7 deadly sins of records retentionRecord retention is both a fact of life and a growing headache for organizations burdened by a spiraling number of regulations and legal obligations. Here are worst (and best) practices for securing data and documents.By John Edwards Mar 23, 2021 6 minsGovernmentData and Information SecurityPrivacyfeatureThe HITECH Act explained: Definition, compliance, and violationsMany of the rules and fines we associate with HIPAA were rolled out with the HITECH Act in order to make electronic health records a safe reality.By Josh Fruhlinger Feb 18, 2021 9 minsRegulationElectronic Health RecordsHealthcare IndustryopinionThe most important cybersecurity topics for business executivesData privacy, current cyberthreats, and cybersecurity culture and training top the list, but are these the right priorities?By Jon Oltsik Feb 10, 2021 4 minsRegulationCyberattacksCybercrimefeatureCOPPA explained: How this law protects children’s privacyThe Children's Online Privacy Protection Act places strict limits on what you can do with data about kids younger than 13. Here's how to know if it applies to your organization and how to be compliant.By Josh Fruhlinger Feb 08, 2021 11 minsRegulationInternetPrivacyfeature12 new state privacy and security laws explained: Is your business ready?States from Maine to California have recently enacted privacy, data security, cybersecurity, and data breach notification laws. We break down what each of these laws entails.By Cynthia Brumfield Dec 28, 2020 15 minsData BreachData PrivacyData and Information SecurityfeatureGLBA explained: What the Graham-Leach-Bailey Act means for privacy and IT securityThis banking regulatory act has an infosec reach that goes far beyond the financial services industry.By Josh Fruhlinger Dec 17, 2020 10 minsRegulationData and Information SecurityPrivacynews analysisThe road to a data breach is paved with good intentionsAustralian travel agent’s woes are a reminder that privacy policies don’t automatically let you share customer data, even for well-intentioned efforts.By David Braue Dec 13, 2020 4 minsData BreachPrivacySecuritynews analysisNew AI privacy, security regulations likely coming with pending federal, state billsCISOs should prepare for new requirements to protect data collected for and generated by artificial intelligence algorithms.By Cynthia Brumfield Dec 08, 2020 6 minsData PrivacyCompliancePrivacynews analysisPassage of California privacy act could spur similar new regulations in other statesVoters approved the California Privacy Rights and Enforcement Act (CPRA), which in part limits how organizations can use personal data. Legal experts expect other states to follow suit.By Cynthia Brumfield Nov 12, 2020 5 minsData PrivacyCompliancePrivacyfeatureThe CISO's newest responsibility: Building trustLeading CISOs have already embraced the concept of trust as a deliverable and indeed are making it the central theme of their entire security function.By Mary K. Pratt Oct 13, 2020 9 minsData PrivacyData and Information SecurityPrivacy Show more Show less View all Resources whitepaper Report: Innovate 33% Faster Using AI-Powered App Development 80% of CIOs report they have yet to achieve the business outcomes they expected from application modernization. The post Report: Innovate 33% Faster Using AI-Powered App Development appeared first on Whitepaper Repository. By Turing Enterprises, Inc. 25 Sep 2023Application ManagementArtificial IntelligenceBusiness Operations whitepaper Case Study: Leading Healthcare Company Increases App Dev Testing Speed by 83% and More By Turing Enterprises, Inc. 25 Sep 2023Application ManagementArtificial IntelligenceBusiness Operations whitepaper Solve It Stories: TaskRay for Healthcare Organizations By Salesforce 25 Sep 2023Enterprise ApplicationsProject ManagementSalesforce.com View all Video on demand videoAligning security, compliance and privacy across inventory trackingBrad Wells, Executive Director, Information Security, and Kandice Samuelson, Senior Director, IT Governance at PPD lead a team enhancing PPD’s inventory tracking system that identifies PPD's most valuable assets. Join us to learn how they distribute security resources for appropriate levels of protection, maintain compliance with government regulations and industry standards, and leverage information security controls aligned with client requirements, industry frameworks and privacy regulations. May 28, 2021 20 minsComplianceData and Information SecurityPrivacy How the California Consumer Privacy Act (CCPA) will affect you and your business | TECH(talk) Sep 06, 2019 23 minsData PrivacyGDPRGovernment 6 security reasons to upgrade to Windows 10 Jul 25, 2018 1 minsApplication SecurityPrivacyWindows Prepping for GDPR May 18, 2018 36 minsRegulationPrivacySecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news analysis DHS unveils one common platform for reporting cyber incidents By Cynthia Brumfield Sep 25, 202310 mins RegulationRegulationRegulation news Chinese state actors behind espionage attacks on Southeast Asian government By Shweta Sharma Sep 25, 20234 mins Advanced Persistent ThreatsCyberattacks feature How to pick the best endpoint detection and response solution By Linda Rosencrance Sep 25, 202310 mins Intrusion Detection SoftwareSecurity Monitoring SoftwareData and Information Security podcast CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO podcast CSO Executive Sessions Australia with Siddiqua Shaheen, Head of Cyber Governance at Lander & Rogers Sep 07, 202317 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO video CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO video What is zero trust security? Sep 06, 20233 mins AuthenticationZero TrustNetwork Security video CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO