article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

Regulatory compliance and data privacy issues have long been an IT security nightmare. And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have been at the forefront of corporate concerns. GDPR-style data privacy laws came to the U.S. Location Matters.

article thumbnail

Data Privacy Week 2023: Privacy Gains Power From Other Societal Forces

Security Boulevard

As the conversation around privacy progresses beyond a focus on security infrastructure and best practices for preventing data breaches, regulations are working to catch up. For more information on Data Privacy Week, click here. Read more of our 2023 data privacy predictions in this piece here.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is Maryland’s Online Data Privacy Protection Act?

Centraleyes

The measure prohibits the sale of sensitive data entirely, includes universal opt-out methods and anti-discrimination rules provisions, and provides a limited 60-day right to cure that expires in 2027. With MODPA, Maryland sets a precedent for prioritizing consumer privacy and data protection in the digital era.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

Over the past year, the Telecom industry has suffered some massive, high-profile data breaches — all of which happened by exploiting unprotected APIs. These include breaches on major operators such as T-Mobile. What are Telcos particularly vulnerable to API attacks?

article thumbnail

New Federal Privacy Law Legislation Introduced

SecureWorld News

to introduce a national data privacy law. With no current national law, states are forced to create their own privacy policies, which can be confusing and complicated for organizations operating in multiple states. Thankfully, it appears we have taken one step closer to having a national data privacy law.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Security Boulevard

Over the past year, the Telecom industry has suffered some massive, high-profile data breaches — all of which happened by exploiting unprotected APIs. These include breaches on major operators such as T-Mobile. What are Telcos particularly vulnerable to API attacks?

article thumbnail

CISA, SolarWinds up interest in security scoring

SC Magazine

They’re also using it for investigative purposes, such as if they believe there has been a data breach that could violate a state consumer protection or data or state data privacy law. They can be part of those investigations. So, they can be used in an offensive and a defensive manner.