The gap in your CCPA /GDPR compliance strategy is running on your website

High-profile breaches have pushed data privacy and security to the top of boardroom concerns. But what if your web applications are undermining your efforts to comply?
The post The gap in your CCPA /GDPR compliance strategy is running on your webs… Continue reading The gap in your CCPA /GDPR compliance strategy is running on your website

Do Californians use CCPA to protect their privacy?

Californians regularly opt-out of companies selling their personal information, with “Do-not-sell” being the most common CCPA right exercised, happening nearly 50% of the time over access and deletion requests, DataGrail’s Mid-Year CCPA Trends Re… Continue reading Do Californians use CCPA to protect their privacy?

CISOs struggling to prep for security audits

Calendars for security and compliance audits are largely unchanged despite COVID-19, yet the pandemic is straining teams as they work remotely, according to Shujinko. Moreover, CISOs are tasked with preparing for more than three audits on average in th… Continue reading CISOs struggling to prep for security audits

Great Expectations: Identifying Non-Secured Personal Data for CCPA

“In a word, I was too cowardly to do what I knew to be right, as I had been too cowardly to avoid doing what I knew to be wrong.” Charles Dickens When privacy practitioners championed the use of the first generation and now outdated ‘Mapping Sold as Di… Continue reading Great Expectations: Identifying Non-Secured Personal Data for CCPA

Data protection critical to keeping customers coming back for more

Although consumers remain concerned about sharing personal data with companies, the results of a Privitar survey highlight an opportunity for businesses to take a leadership role and build brand loyalty by protecting their customers. The report found t… Continue reading Data protection critical to keeping customers coming back for more

How AI can alleviate data lifecycle risks and challenges

The volume of business data worldwide is growing at an astounding pace, with some estimates showing the figure doubling every year. Over time, every company generates and accumulates a massive trove of data, files and content – some inconsequential and… Continue reading How AI can alleviate data lifecycle risks and challenges

Out of the Grace Period: Trust and Communication Rises in a Post-CCPA World

Six months ago, the California Consumer Privacy Act (CCPA) was put into effect, granting California residents increased rights over how their personal data is gathered and shared by the companies they interact with. Leading up to its launch, organizati… Continue reading Out of the Grace Period: Trust and Communication Rises in a Post-CCPA World

Out of the Grace Period: Trust and Communication Rises in a Post-CCPA World

Six months ago, the California Consumer Privacy Act (CCPA) was put into effect, granting California residents increased rights over how their personal data is gathered and shared by the companies they interact with. Leading up to its launch, organizations expressed concern over whether they were fully compliant with the incoming regulation, and if they weren’t, how they could act quickly to avoid compliance failures. Continue reading Out of the Grace Period: Trust and Communication Rises in a Post-CCPA World

CCPA Compliance Can Improve SMBs’ Cybersecurity

The California Consumer Privacy Act (CCPA) went into effect Jan. 1, but its enforcement began July 1. Yet, many organizations have not prepared for CCPA at all, according to a study from data privacy management company Ethyca. More than half of the or… Continue reading CCPA Compliance Can Improve SMBs’ Cybersecurity

92% of the world’s top websites expose customer data to attackers

Tala’s Global Data at Risk: 2020 State of the Web Report indicates that sensitive data like PII and credit card information has never been more at risk – and security effectiveness is declining.
The post 92% of the world’s top websites… Continue reading 92% of the world’s top websites expose customer data to attackers