With the GDPR now in effect, businesses across Europe are adjusting to a new regulatory environment. David McLeod of activpayroll examines the GDPR's impact on the payroll landscape, and how employers might boost their compliance performance.
If signed by Governor Brown on September 30th, California’s "SB-327 Information privacy: connected devices” bill – the first to establish regulation around IoT – will require connected devices sold or offered for sale in California to have “reasonable security features appropriate to the nature of the device”. Although the bill is a good start, Aaron Guzman, Head of Automotive & IoT at Aon, outlines what an even better approach might be.
The recent cyberattack on the MyHeritage DNA and genealogy testing company compromised about 92 million user accounts. CipherCloud's Pravin Kothari discusses the rise in consumer DNA testing, the risks of this data being used for exploitation or harm, and the protection that consumers should demand of their most valuable personal information.
With the GDPR having begun its reign as the most comprehensive digital privacy legislation that the world has ever seen, we’ve officially entered a new era of data privacy rights and regulations. But it’s also a compliance burden to many businesses. Here are the four biggest rewards that businesses can reap by complying with privacy regulations like the GDPR – even if they don’t need to.
With May 25 looming, preparing for compliance with the European Union (EU) General Data Protection Regulation (GDPR) is an unavoidable necessity for businesses – and an important act of social responsibility.
Organizations can benefit from handling more data and doing more with their existing data, even when obstacles stand in their way. Here are three challenges that hold companies back from using more data and three difficulties of doing more with that data.
Mobile Apps are used every day without a second thought. But convenience comes at a cost. You may want to think twice before you download.
The GDPR is a de facto mandate for every company to invest in process automation software. How can business workflows help with privacy compliance? Read to learn more.
With hackers using ransomware and other attack methods to compromise high-value privileged user credentials, organizations need to take a serious look at how they approach their cyber defense. Here’s where to start.
Even with new technologies abound, we’ve come to rely on passwords as our primary means of managing access to systems, applications and data. In reality, passwords are our first—and in most cases, only—line of defense when it comes to protecting against unauthorized access, misuse and theft.
Enterprise security teams have a namesake job to do – secure their organizations – but it does not have to come at the expense of their colleague’s privacy. How, then, do organizations balance the requirements and expectations of both sides and keep their data secure while ensuring that the company refrains from violating privacy laws?
ISSA-LA presents two women in security and technology panels. The first panel explores information security, IT and other technology-oriented positions as they relate to attracting, recruiting, and maintaining diverse talent. And the second panel focuses on a different kind of inclusion: security versus privacy in the cybersecurity space.
Source documents sent for translation often contain sensitive information, and data corruption in the language industry can be extremely damaging for companies. Making sure your language provider has established a strong information security management system is imperative.
The new Facebook Messenger "live location" feature comes in handy when coordinating plans with friends, as it lets users share their real-time location on a map within a private/group message. But what kind of security vulnerabilities are consumers voluntarily opening themselves up to?
While the US has been slow to legislate meaningful ID protection safeguards, an unexpected agency is taking a leadership position - The IRS.
Technology entrepreneur Vishal Gupta explains how living by the principles of empathizing with the individuals whose data his firm is charged with protecting frames the way he approaches his InfoSec Life.
With hacking rampant, and the holiday shopping season upon us, no company wants to become the next headline. Lucas Long from InfoTrust shares 3 ways to keep customer data safe.
Breaking into a computer is like breaking into a house. However, breaking into a smartphone is like breaking into a brain. What does this mean? Expert Kevin Haley explains.
The relatively new field of privacy is a striking example of a profession that gets gender equity right. Will this equality last or will the industry slowly laud more men as leaders like the InfoSec space?
The 8th Annual ISSA Los Angeles Information Security Summit was back at the Universal City Hilton again this year, drawing well over 700 registrants from all over Southern California, Arizona and Nevada. This post covers some of the highlights captured from this year's event.