_Experts-Privacy

DNA Data Brings Unforeseen Challenges To Data Privacy

The recent cyberattack on the MyHeritage DNA and genealogy testing company compromised about 92 million user accounts. CipherCloud's Pravin Kothari discusses the rise in consumer DNA testing, the risks of this data being used for exploitation or harm, and the protection that consumers should demand of their most valuable personal information.

It Is A New Era For Data Privacy And Regulations

With the GDPR having begun its reign as the most comprehensive digital privacy legislation that the world has ever seen, we’ve officially entered a new era of data privacy rights and regulations. But it’s also a compliance burden to many businesses. Here are the four biggest rewards that businesses can reap by complying with privacy regulations like the GDPR – even if they don’t need to.

How About Treating Everyone’s Data As If It Were Your Own?

With May 25 looming, preparing for compliance with the European Union (EU) General Data Protection Regulation (GDPR) is an unavoidable necessity for businesses – and an important act of social responsibility.

What Prevents Organizations from Using Even More Data?

Organizations can benefit from handling more data and doing more with their existing data, even when obstacles stand in their way. Here are three challenges that hold companies back from using more data and three difficulties of doing more with that data.

GDPR: Workflow Processes Can Help With Data Management

The GDPR is a de facto mandate for every company to invest in process automation software. How can business workflows help with privacy compliance? Read to learn more.

How to Manage Security Risks and Be Happy

With hackers using ransomware and other attack methods to compromise high-value privileged user credentials, organizations need to take a serious look at how they approach their cyber defense. Here’s where to start.

Seriously?! Can You Not Do That? | Chapter II

Even with new technologies abound, we’ve come to rely on passwords as our primary means of managing access to systems, applications and data. In reality, passwords are our first—and in most cases, only—line of defense when it comes to protecting against unauthorized access, misuse and theft.

Balancing Security and Privacy in the Enterprise

Enterprise security teams have a namesake job to do – secure their organizations – but it does not have to come at the expense of their colleague’s privacy. How, then, do organizations balance the requirements and expectations of both sides and keep their data secure while ensuring that the company refrains from violating privacy laws?

Experts Panels On Security And Privacy At ISSA-LA Summit #9

ISSA-LA presents two women in security and technology panels. The first panel explores information security, IT and other technology-oriented positions as they relate to attracting, recruiting, and maintaining diverse talent. And the second panel focuses on a different kind of inclusion: security versus privacy in the cybersecurity space.

Does Your Language Service Provider Keep Your Data Safe?

Source documents sent for translation often contain sensitive information, and data corruption in the language industry can be extremely damaging for companies. Making sure your language provider has established a strong information security management system is imperative.

Think About It: Messenger's Live Location, and Other Privacy Issues on Facebook

The new Facebook Messenger "live location" feature comes in handy when coordinating plans with friends, as it lets users share their real-time location on a map within a private/group message. But what kind of security vulnerabilities are consumers voluntarily opening themselves up to?

An Unexpected Champion in the Fight Against Identity Theft - The IRS

While the US has been slow to legislate meaningful ID protection safeguards, an unexpected agency is taking a leadership position - The IRS.

Cybersecurity Is About Privacy, Empathy, and the Real World

Technology entrepreneur Vishal Gupta explains how living by the principles of empathizing with the individuals whose data his firm is charged with protecting frames the way he approaches his InfoSec Life.

Dear Santa, Please Keep My Customer Data Safe This Year

With hacking rampant, and the holiday shopping season upon us, no company wants to become the next headline. Lucas Long from InfoTrust shares 3 ways to keep customer data safe.

There Is Gender Equality in the Privacy Field...But Will it Last?

The relatively new field of privacy is a striking example of a profession that gets gender equity right. Will this equality last or will the industry slowly laud more men as leaders like the InfoSec space?

Privacy Risk and Control Design: NIST’s Framework for Managing Privacy Risk

Privacy Risk and Control Design: NIST’s Framework for Managing Privacy Risk

We made our way to the Moscone Center for the final day of sessions on a fresh San Francisco Friday morning. NIST’s (National Institute of Standard Technology) Framework for Managing Privacy Risk was the topic the panel was asked to dissect and discuss.