article thumbnail

Data Privacy in the United States: A Recap of 2023 Developments

Centraleyes

2023 marked a surge in comprehensive state data privacy laws. At the beginning of the year, only five states—California, Colorado, Virginia, Utah, and Connecticut—had comprehensive data privacy legislation. By the end of the year, the number of states with privacy laws more than doubled.

article thumbnail

Explained: Privacy washing

Malwarebytes

Some of the most personal and secretive troves of data rank as the most expensive. In a recent blog, privacy company Proton explained how Google is spending millions lobbying and actively fighting against privacy laws that would protect you from online surveillance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

In this blog, we will explain the unique data security challenges for Telcos and three ways how both Thales and Red Hat can help them protect against future API attacks. Unfortunately, API attacks are increasing as vectors for security incidents. What are APIs?

article thumbnail

What is Maryland’s Online Data Privacy Protection Act?

Centraleyes

The measure prohibits the sale of sensitive data entirely, includes universal opt-out methods and anti-discrimination rules provisions, and provides a limited 60-day right to cure that expires in 2027. With MODPA, Maryland sets a precedent for prioritizing consumer privacy and data protection in the digital era.

article thumbnail

GUEST ESSAY: A primer on the degrees of privacy tech companies assign to your digital footprints

The Last Watchdog

Here we’ll discuss the implications to the third-party tracking and data which has been most impacted by recent privacy regulations and protocols. First it is important to understand the different degrees of data privacy. Degrees of privacy. Check out the examples below from Forrester’s blog.

eCommerce 113
article thumbnail

New Jersey Privacy Act: What to Expect

Centraleyes

“New Jersey has long been a leader in data privacy,” stated Brandon Pugh, CIPP/US, CIPM, R-Street Institute Policy Director for Cybersecurity and Emerging Threats. The bill requires a controller to conduct a data protection impact assessment before processing personally identifiable information.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Security Boulevard

In this blog, we will explain the unique data security challenges for Telcos and three ways how both Thales and Red Hat can help them protect against future API attacks. Unfortunately, API attacks are increasing as vectors for security incidents. What are APIs?