3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020

The biggest takeaway from observing 2019 trends is that being proactive and having a data privacy strategy in place is important to help mitigate the risk of a data privacy breach.

The post 3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020 appeared first on Security Intelligence.

Continue reading 3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020

How Digital Natives Are Shaping the Future of Data Privacy

Our collective attitude toward sharing is changing as we learn more about how maintaining data privacy is both desirable and difficult.

The post How Digital Natives Are Shaping the Future of Data Privacy appeared first on Security Intelligence.

Continue reading How Digital Natives Are Shaping the Future of Data Privacy

IBM X-Force Security Predictions for 2020

Experts from IBM X-Force reflect on the past year and also share security predictions for 2020, including evolutions in ransomware, AI adoption and targets for cybercriminals.

The post IBM X-Force Security Predictions for 2020 appeared first on Security Intelligence.

Continue reading IBM X-Force Security Predictions for 2020

You Don’t Know What You Don’t Know: 5 Best Practices for Data Discovery and Classification

These five best practices can help you develop effective data discovery and classification processes, which are foundational pillars of any data protection strategy.

The post You Don’t Know What You Don’t Know: 5 Best Practices for Data Discovery and Classification appeared first on Security Intelligence.

Continue reading You Don’t Know What You Don’t Know: 5 Best Practices for Data Discovery and Classification

Data Discovery and Classification Are Complicated, But Critical to Your Data Protection Program

Given the myriad strategic, tactical, business and technical reasons for performing data discovery and classification, why isn’t it part of every company’s data protection program?

The post Data Discovery and Classification Are Complicated, But Critical to Your Data Protection Program appeared first on Security Intelligence.

Continue reading Data Discovery and Classification Are Complicated, But Critical to Your Data Protection Program

How PR Teams Can Prepare for Data Breach Risks With Incident Response Planning

Like your incident response team, the PR team needs to understand data breach risks, prepare with communication templates, processes, and tooling and be part of your incident response plan.

The post How PR Teams Can Prepare for Data Breach Risks With Incident Response Planning appeared first on Security Intelligence.

Continue reading How PR Teams Can Prepare for Data Breach Risks With Incident Response Planning

Will the Future of Authentication Run Into a Privacy Wall?

Digital identify, technological innovation, authentication and data privacy issues are not aligned. This impacts how we handle relationships and business. Policy issues must be resolved.

The post Will the Future of Authentication Run Into a Privacy Wall? appeared first on Security Intelligence.

Continue reading Will the Future of Authentication Run Into a Privacy Wall?

11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget

A bigger cybersecurity budget is a tool to address security risks, business needs and industry changes. Here are 11 statistics on CISO spending to help inform your 2020 cybersecurity budget.

The post 11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget appeared first on Security Intelligence.

Continue reading 11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget

5 Key Steps to Developing Your Global Data Privacy Program

Reading Time: 7 minutes If your organization does business with customers in multiple regions and thus must comply with multiple data privacy regulations, it helps to address them as a single, combined initiative.

The post 5 Key Steps to Developing Your Global Data Privacy Program appeared first on Security Intelligence.

Continue reading 5 Key Steps to Developing Your Global Data Privacy Program

5G Technology Is Coming, But Is It Already Filled With Security Flaws?

Reading Time: 3 minutes There is a lot to be excited about with 5G technology, but it will also open more doors for threat actors to get into networks, making it more difficult to effectively protect endpoints and data.

The post 5G Technology Is Coming, But Is It Already Filled With Security Flaws? appeared first on Security Intelligence.

Continue reading 5G Technology Is Coming, But Is It Already Filled With Security Flaws?