How Security Assurance Teams Can Use DevOps Principles to Become More Productive and Happier

Information security compliance teams play an increasingly important role in the growth of their companies. Depending on its …
Read More
The post How Security Assurance Teams Can Use DevOps Principles to Become More Productive and Happier appeared f… Continue reading How Security Assurance Teams Can Use DevOps Principles to Become More Productive and Happier

DataGrail snares $30M Series B to help deal with privacy regulations

DataGrail, a startup that helps customers understand where their data lives in order to help comply with a growing body of privacy regulations, announced a $30 million Series B today. Felicis Ventures led the round with help from Basis Set Ventures, Operator Collective and previous investors. One of the interesting aspects of this round was […] Continue reading DataGrail snares $30M Series B to help deal with privacy regulations

How South Africa’s POPIA will Affect your Business

It goes without saying that data is an invaluable asset to any company. On the other hand, privacy is an invaluable asset to us as individuals. In order to reconcile these two points, a variety of regulations have imbued individuals with the right… Continue reading How South Africa’s POPIA will Affect your Business

Breaking Down SOC 2 and ISO 27001: Is One Really Better?

We can all agree on the importance of protecting customer data today; 87% of consumers view data privacy …
Read More
The post Breaking Down SOC 2 and ISO 27001: Is One Really Better? appeared first on Hyperproof.
The post Breaking Down SOC 2 and ISO… Continue reading Breaking Down SOC 2 and ISO 27001: Is One Really Better?

Overcoming Privacy Inertia to Protect Data

With so many organizations relying on cloud computing, keeping data protected while using cloud services has become a high priority. Yet, even though there is a greater emphasis on overall cybersecurity for the cloud, data privacy has been slower to e… Continue reading Overcoming Privacy Inertia to Protect Data

How does ManageEngine comply with the UK data protection laws post Brexit?

Note: This blog is published by Zoho and is applicable to all divisions of Zoho including  ManageEngine (the enterprise IT management division), Site24x7, and WebNMS.
The Brexit transition period ended on December 31, 2020, and the EU General Data Prot… Continue reading How does ManageEngine comply with the UK data protection laws post Brexit?

How a Government Entity Switched to MixMode and Decreased Data Storage Costs by 50%

Data is the beating heart of every modern organization, but it’s only valuable when it’s accessible, understandable, and most importantly, protected.
The post How a Government Entity Switched to MixMode and Decreased Data Storage Costs by 50% appeared … Continue reading How a Government Entity Switched to MixMode and Decreased Data Storage Costs by 50%

Law Enforcement Eyeing Contact Tracing Apps

Some might say it was inevitable that, once law enforcement and intelligence agencies realized the power of COVID-19 contact tracing applications to confirm proximity between persons, privacy would become a secondary issue. They would be right. Austra… Continue reading Law Enforcement Eyeing Contact Tracing Apps

Can Breach Victims Sue Now for Future Harm?

I have often written about the Kubler Ross stages of a data breach: denial, investigation, anger, blame, acceptance and litigation. Or something like that. A recent case in the federal appeals court in Georgia points out a problem with post-breach cla… Continue reading Can Breach Victims Sue Now for Future Harm?

Does a Strong Privacy Program Make for a Stronger Security Program?

There is a saying in sociopolitical circles: “politics is downstream from culture.” Using that same line of thinking, poses a question: Is information security downstream from data privacy? In order to tell the difference between security and privacy and how they feed in to each other to achieve both, we’ll look at the leading regulation: the National Institute of […]

The post Does a Strong Privacy Program Make for a Stronger Security Program? appeared first on Security Intelligence.

Continue reading Does a Strong Privacy Program Make for a Stronger Security Program?