Remove Consumer Protection Remove Data breaches Remove Risk Remove Technology
article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

Over the past year, the Telecom industry has suffered some massive, high-profile data breaches — all of which happened by exploiting unprotected APIs. These include breaches on major operators such as T-Mobile. Legacy Technology Clashes : Most Telcos have very large legacy IT footprints.

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

GDPR, the EU’s flagship data privacy and “right to be forgotten” regulation, has made the stakes of a data breach higher than ever. See the Top Governance, Risk and Compliance (GRC) Tools. Health data and patient data in the U.S. Financial Data Protection Laws. In the U.S.,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Stretching the boundaries through artificial intelligence: the European proposal for a dedicated regulation. The protection of personal data.

Privacy and Cybersecurity Law

The obligation to report serious incidents or malfunctions recalls the obligation to notify data breaches. Artificial intelligence not only crosses over into data protection law, but also extends to other areas of law, such as intellectual property, competition, consumer protection, and insurance, to name but a few.

article thumbnail

Me on the Equifax Breach

Schneier on Security

Hearing on "Securing Consumers' Credit Data in the Age of Digital Commerce". Subcommittee on Digital Commerce and Consumer Protection. Mister Chairman and Members of the Committee, thank you for the opportunity to testify today concerning the security of credit data. It's a data broker. Before the.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Security Boulevard

Over the past year, the Telecom industry has suffered some massive, high-profile data breaches — all of which happened by exploiting unprotected APIs. These include breaches on major operators such as T-Mobile. Legacy Technology Clashes : Most Telcos have very large legacy IT footprints.

article thumbnail

New Federal Privacy Law Legislation Introduced

SecureWorld News

This bill will create those critical protections. If we do not have a clear domestic policy, we will not be able to shape standards abroad, and risk letting others, like the European Union, drive global policy.". This is an international issue as much as it is a domestic concern. Tom Quaadman, Executive Vice President at the U.S.

article thumbnail

GUEST ESSAY: A primer on best practices for automating supply chain cybersecurity

The Last Watchdog

They point out how supply chains rely on software yet lack the security tools to protect them. Data breaches exposed over 37 billion records in 2020 alone — a 141% jump from 2019. Businesses must automatically secure their supply chains to protect themselves and comply with consumer-protection laws.