Press "Enter" to skip to content

Tag: information security

Top Cloud Security Steps Every Business Needs to Take

Since qualified people who can deal with online security threats are limited, security teams have had to reevaluate their strategies on a regular basis. In addition to that, security products are simply being outshined by the increasing challenges of protecting active, computer-generated, and shared environments. According to statistics on internet usage, the size of the global public cloud computing service market is estimated to have reached over 182 billion U.S.…

Why You Should Celebrate the Data Privacy Day

It’s Data Privacy Day! Do you treat your data privacy as you treat your home? Do you securely lock the doors to keep strangers out, hide the keys in a safe and secure place and keep your eyes peeled for prying eyes? Well, if you don’t, here are some facts to ponder: We now live in the digital era where our personal data is constantly collected, used, and shared across…

Strengthening Privacy Rights with Privacy Enhancing Technologies

More rigorous privacy regulations such as the EU GDPR and a number of US privacy initiatives such as the recently ratified California Consumer Privacy Act impose higher standards on data controllers and processors to safeguard privacy rights – including data subject consent management, accommodating data subject requests, data portability and more onerous data controller and processor accountability standards. Moreover, there seems to be momentum developing for a more comprehensive US Federal Privacy initiative consistent with GDPR.…