With the Indian Government releasing the Justice BN Srikrishna Committee of Experts Report on Data Protection recently, a new law in the form of the Personal Data Protection Bill, 2018, is all set to soon become a reality in India.
The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.
There are a whole host of reasons why organizations should consider encrypting their sensitive data: for protection, for legal reasons, to comply with global compliance policies and safeguard customer interests.
Let’s visualize another scenario. A group of employees go down to have lunch. One of them swipes their own card and holds it open for everyone to go through. He doesn’t notice that someone else has slipped inside while the door was open.
One of the most publicized POS breaches happened with American retailer, Target in 2013 where 41 million customer payment card accounts and contact information for more than 60 million Target customers were affected.
Vulnerability management is a key process in any information security program and regulatory compliance framework. Why is it that many companies lag behind on patches and updating their systems?
All companies connected to the internet are vulnerable to cyber-attacks. And the potential losses are significant. With increased scrutiny placed upon managing potential cyber security risks, it’s more important than ever to implement a robust vulnerability management program.
A vote by European Union lawmakers seeking to suspend Privacy Shield could spell bad news for businesses that have built their GDPR compliance strategy on adherence to the EU-U.S. data transfer agreement’s principles.