article thumbnail

Indiana sues TikTok, describes it as "Chinese Trojan Horse"

Malwarebytes

The second suit claims that TikTok violated consumer protection laws by not disclosing that China has access to sensitive user data. As long as TikTok is permitted to deceive and mislead Indiana consumers about the risks to their data, those consumers and their privacy are easy prey.".

article thumbnail

The Evolving Legislative and Compliance Landscape: A Roadmap for Business Leaders

Thales Cloud Protection & Licensing

EU Cyber Resilience Act The Cyber Resilience Act establishes a groundbreaking framework to ensure that products with digital elements, both hardware and software, enter the European market with strong cybersecurity safeguards. It aims to improve competition and innovation in the financial industry while increasing consumer protection.

Risk 71
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Evolving Legislative and Compliance Landscape: A Roadmap for Business Leaders

Security Boulevard

EU Cyber Resilience Act The Cyber Resilience Act establishes a groundbreaking framework to ensure that products with digital elements, both hardware and software, enter the European market with strong cybersecurity safeguards. It aims to improve competition and innovation in the financial industry while increasing consumer protection.

Risk 70
article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

In this blog, we will explain the unique data security challenges for Telcos and three ways how both Thales and Red Hat can help them protect against future API attacks. APIs are software intermediaries that enable two software components to communicate with each other. What are APIs?

article thumbnail

Cybersecurity Report: June 29, 2015

SiteLock

LOT stated that no ongoing flights or other airport computer systems were affected and the flights already in the air to scheduled to land at Warsaw were at no risk. Popular Security Software Came Under Relentless NSA and GCHQ Attacks. US to Raise Breach of Government Records at Talks with China.

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

See the Top Governance, Risk and Compliance (GRC) Tools. Financial Data Protection Laws. financial data must comply with consumer-protection laws such as the Electronics Fund Transfer Act (EFTA) and a litany of regulations enforced by the SEC (such as Sarbanes-Oxley), CFTC, FISMA, and other financial regulatory bodies.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Security Boulevard

In this blog, we will explain the unique data security challenges for Telcos and three ways how both Thales and Red Hat can help them protect against future API attacks. APIs are software intermediaries that enable two software components to communicate with each other. What are APIs?