article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

Regulatory compliance and data privacy issues have long been an IT security nightmare. And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have been at the forefront of corporate concerns. GDPR-style data privacy laws came to the U.S. Location Matters.

article thumbnail

Three takeaways from three years of GDPR

SC Magazine

Today’s columnist, Chad Gross of A-LIGN, reflects on the progess the industy has made with data privacy since GDPR went into effect three years ago. One week ago we celebrated the third anniversary of the European Union’s (EU) General Data Protection Regulation (GDPR) coming into effect. And, what laws protect me?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

In this blog, we will explain the unique data security challenges for Telcos and three ways how both Thales and Red Hat can help them protect against future API attacks. APIs are software intermediaries that enable two software components to communicate with each other. What are APIs?

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Security Boulevard

In this blog, we will explain the unique data security challenges for Telcos and three ways how both Thales and Red Hat can help them protect against future API attacks. APIs are software intermediaries that enable two software components to communicate with each other. What are APIs?

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

“I would say that you’re talking about state data breach laws, state and federal laws against unfair and deceptive trade practices, [and] potentially HIPAA liability for health institutions that were relying on a system that was using inadequate security protocols,” Davisson continued. “If Look at the Mac operating system.

article thumbnail

Dentons Privacy Community does Privacy by Design

Privacy and Cybersecurity Law

talking about privacy assessments). talking about DPIAs) or more global (e.g.