Securing Cloud Technology in a Growing Threat Landscape

Cloud technologies are becoming more and more popular. Many companies shifted their workloads and their IT infrastructures into the cloud. The advantages are clear: more flexibility and scalability, less admin overhead and often cost savings. But with those advantages also come many risks. Recent studies have shown several threats cloud technologies face. As data transfers […]

The post Securing Cloud Technology in a Growing Threat Landscape appeared first on Security Intelligence.

Continue reading Securing Cloud Technology in a Growing Threat Landscape

How businesses are prioritizing data privacy

In 2021, the demand for data privacy jobs soared with no indication of slowing down and stemming from the proliferation of new government regulations and cloud migration. In this video for Help Net Security, Stephen Cavey, Chief Evangelist at Ground La… Continue reading How businesses are prioritizing data privacy

Lawmakers want to restrict user data sales to nations like China, Russia

The bill tasks the Department of Commerce with creating new export rules.

The post Lawmakers want to restrict user data sales to nations like China, Russia appeared first on CyberScoop.

Continue reading Lawmakers want to restrict user data sales to nations like China, Russia

Data recovery depends on how good your backup strategy is

99% of surveyed IT decision makers state they have backup strategies in place, but just 26% have admitted they were unable to fully restore all data/documents when recovering from a backup, according to an annual survey conducted in April 2022 by Apric… Continue reading Data recovery depends on how good your backup strategy is

Congress reaches compromise on draft privacy legislation

Newly proposed federal privacy framework comes with protections for biometric data and against discrimination.

The post Congress reaches compromise on draft privacy legislation appeared first on CyberScoop.

Continue reading Congress reaches compromise on draft privacy legislation

How effective are public-private partnerships?

Ninety-three percent of cyber decision-makers say public-private partnerships are vital to national defense, but only 34 percent believe they are very effective, according to a study from MeriTalk and RSA Conference. When asked to grade current efforts… Continue reading How effective are public-private partnerships?

Regulators slam Twitter with $150M fine over using consumer security data for advertising

The practice violates federal law and a 2011 order from the FTC, which alleged Twitter’s failure to safeguard user data led to two breaches.

The post Regulators slam Twitter with $150M fine over using consumer security data for advertising appeared first on CyberScoop.

Continue reading Regulators slam Twitter with $150M fine over using consumer security data for advertising

RansomHouse: Bug bounty hunters gone rogue?

A new cybercrime outfit that calls itself RansomHouse is attempting to carve out a niche of the cyber extortion market for itself by hitting organizations, stealing their data, and offering to delete it and provide a full report on how and what vulnera… Continue reading RansomHouse: Bug bounty hunters gone rogue?

You should be able to trust organizations that handle your personal data

People have become much more sensitive about privacy and are more concerned about who has access to their data, but at the same time they are constantly sharing that information online, whether by logging into a website, by posting something on social … Continue reading You should be able to trust organizations that handle your personal data