Remove tags gdpr
article thumbnail

New to cookies? Here’s what you need to know (Part 1)

BH Consulting

This two-part blog aims to explain what they are, and why we’re hearing so much about them these days. We’ll give a rundown of cookie requirements, consent, and what organisations must do to make sure their cookies comply with the EU GDPR (and why that matters). This legislation is separate to, but complements, the GDPR.

article thumbnail

Weekly Update 96

Troy Hunt

The most unexpected outcome of those discussions was a real flat-earther chiming into the Twitter discussion after someone made the innocent mistake of using the #FlatEarth hash tag to describe people decrying HTTPS. There's links to that discussion and the nasty comments Scott copped on my blog below.

117
117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Five Key Points When Preventing Cybersecurity Attacks in a World of Hybrid Working

Security Boulevard

<a href='/blog?tag=Endpoint tag=Endpoint Protection'>Endpoint Protection</a> <a href='/blog?tag=Data tag=Data Loss Prevention'>Data Loss Prevention</a> <a href='/blog?tag=File tag=File Transfers'>File Transfers</a> <a href='/blog?tag=Advanced

article thumbnail

How Machine Learning Can Accelerate and Improve the Accuracy of Sensitive Data Classification

Thales Cloud Protection & Licensing

Traditional approaches to data classification use manual tagging which is labor-intensive, error-prone, and not easily scalable. This blog will explain how Thales is enhancing CipherTrust Data Discovery and Classification (DDC) with ML models that help analyze data, learn from insights, and improve results.

article thumbnail

Maintaining Cybersecurity During Rapid Digital Transformation

Security Boulevard

<a href='/blog?tag=Cybersecurity'>Cybersecurity</a> tag=Cybersecurity'>Cybersecurity</a> <a href='/blog?tag=Ransomware'>Ransomware</a> tag=Ransomware'>Ransomware</a> <a href='/blog?tag=Cyber-attacks'>Cyber-attacks</a> Additional Resources.

article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

The very next day I published a blog post about how I made it so fast to search through 154M records and thus began a now 185-post epic where I began detailing the minutiae of how I built this thing, the decisions I made about how to run it and commentary on all sorts of different breaches. And then ensured could never happen again.