72 Hours: Understanding the GDPR Data Breach Reporting Timeline

We’re down to the wire with respect to the General Data Protection Regulation (GDPR) compliance deadline of May 25, 2018. Organizations that fail to comply could face fines of up to €20M (roughly $22M) or 4 percent of their annual global tu… Continue reading 72 Hours: Understanding the GDPR Data Breach Reporting Timeline

Critical Actions to Finalize Your GDPR Compliance Program

Starting May 25, 2018, enforcement begins for the new EU General Data Protection Regulation (GDPR) and its heightened principles and requirements regarding data privacy, data processing, and data security. The newly revised regulation applies to organi… Continue reading Critical Actions to Finalize Your GDPR Compliance Program

Data Security Solutions for GDPR Compliance

Enforcement of the new EU General Data Protection Regulation (GDPR) adopted in 2016 starts on May 25, 2018. It requires all organizations that do any business in the EU or that collect or process personal data originating in the EU to comply with the r… Continue reading Data Security Solutions for GDPR Compliance

Securely Moving Workloads to the Cloud

One debate is about the security of the Cloud and the Cloud provider. Once you decide to go there, the next question is about how to get it done. There are a few key and basic concepts to be followed. First and foremost you need to understand, which re… Continue reading Securely Moving Workloads to the Cloud

What, Me Worry? Car Data, Where Does It Go…

Where does all of that data gathered by car manfacturers while we drive? Perhaps Jonathan M. Gitlin, reporting for everyone’s beloved Ars Technica can fulfill that data request in a speedy manner! Shouldn’t the driver/owner of the vehicle make that de… Continue reading What, Me Worry? Car Data, Where Does It Go…

The Data Security Forecast Calls for Zero Trust

To successfully implement a zero trust architecture, security teams must invest in data security solutions that continuously monitor access in real time.

The post The Data Security Forecast Calls for Zero Trust appeared first on Security Intelligence.

Continue reading The Data Security Forecast Calls for Zero Trust

Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl

Intellectual property security is crucial to any company’s bottom line. IT teams must locate this data, asses its risk and adjust policies accordingly.

The post Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl appeared first on Security Intelligence.

Continue reading Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl

Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl

Intellectual property security is crucial to any company’s bottom line. IT teams must locate this data, asses its risk and adjust policies accordingly.

The post Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl appeared first on Security Intelligence.

Continue reading Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl

Back to Filing Cabinets? Simplifying the Complex Task of Data Security

Without visibility into all data stored on the network, the complex task of data security can have IT teams pining for the bygone days of filing cabinets.

The post Back to Filing Cabinets? Simplifying the Complex Task of Data Security appeared first on Security Intelligence.

Continue reading Back to Filing Cabinets? Simplifying the Complex Task of Data Security

Location! Location! Location! Managing and Protecting Critical Data in the Age of Sprawl

The digital age has created data sprawl, which complicates how organizations locate, classify and secure their critical data.

The post Location! Location! Location! Managing and Protecting Critical Data in the Age of Sprawl appeared first on Security Intelligence.

Continue reading Location! Location! Location! Managing and Protecting Critical Data in the Age of Sprawl