Remove data
article thumbnail

CFPB’s Proposed Data Rules

Schneier on Security

In October, the Consumer Financial Protection Bureau (CFPB) proposed a set of rules that if implemented would transform how financial institutions handle personal data about their customers. Beyond these economic effects, the rules have important data security benefits. The CFPB’s simple and practical rules would fix this.

Banking 236
article thumbnail

Inside the Massive Alleged AT&T Data Breach

Troy Hunt

We're here at "alleged" for two very simple reasons: one is that AT&T is saying "the data didn't come from us", and the other is that I have no way of proving otherwise. But I have proven, with sufficient confidence, that the data is real and the impact is significant. For my part, I've got 4.8M

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Automakers Are Sharing Driver Data with Insurers without Consent

Schneier on Security

Some drivers may not realize that, if they turn on these features, the car companies then give information about how they drive to data brokers like LexisNexis [who then sell it to insurance companies].

Insurance 303
article thumbnail

The Data Breach "Personal Stash" Ecosystem

Troy Hunt

That's the analogy I often use to describe the data breach "personal stash" ecosystem, but with one key difference: if you trade a baseball card then you no longer have the original card, but if you trade a data breach which is merely a digital file, it replicates. The same incidents appear here: And so on and so forth.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

The same principle should apply to your most precious data assets. By only giving users access to what they need for their job, you reduce the risk of data breaches and unauthorized modifications. You should restrict access to sensitive information and systems the same way you restrict access to your house.

article thumbnail

Google Stops Collecting Location Data from Maps

Schneier on Security

Google Maps now stores location data locally on your device, meaning that Google no longer has that data to turn over to the police.

286
286
article thumbnail

Cars Have Terrible Data Privacy

Schneier on Security

A new Mozilla Foundation report concludes that cars, all of them, have terrible data privacy. All 25 car brands we researched earned our *Privacy Not Included warning label—making cars the official worst category of products for privacy that we have ever reviewed. There’s a lot of details in the report. They’re all bad.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported.

article thumbnail

Turning Trial Users Into Successful Customers

Speaker: Daniel Foster, Strategy Lead, TechSmith & Vic DeMarines, VP of Product Management, Revenera

Join us for a discussion about experimenting with data-driven onboarding to boost customer experience during trials and drive business outcomes. TechSmith’s Snagit Strategy Lead, Daniel Foster, will share how he leveraged product usage data, segmentation, and targeted onboarding messaging to improve trial users’ experiences.

article thumbnail

Making Software Pirates Pay: An E-Commerce Playbook

Vendors large and small have been using software intelligence to understand who is using unlicensed versions of their software so they can develop data-driven strategies to identify and convert unpaid users, generating new license revenue. An E-Commerce Conversion Playbook.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place.

article thumbnail

Monetization Monitor: Software Usage Analytics 2020

Efficient usage data collection and analytics can open up significant possibilities for suppliers. Top findings include: Growing Interest in Usage Data. 60% collect usage data; a total of more than 75% will do so in the next two years. Benefits & Challenges of Data Collection. Benefits & Challenges of Data Collection.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. It is the tangents of this data that are vital to a successful change management process. Organize ERM strategy, operations, and data. Determine impact tangents.

article thumbnail

How to Avoid the Pain and Cost of PCI Compliance While Optimizing Payments

Speaker: P. Andrew Sjogren, Sr. Product Marketing Manager at Very Good Security, Matt Doka, Co-Founder and CTO of Fivestars, and Steve Andrews, President & CEO of the Western Bankers Association 

In this webinar, we have a great set of panelists who will take you through how Zero Data strategies can be used as part of a well-rounded compliance and security approach, and get you to market much sooner by also allowing for payment optimization. In this webinar you will learn: The right approach to a Zero Data security platform.

article thumbnail

Back to the Office: Privacy and Security Solutions to Compliance Issues for 2021 and Beyond

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

Join Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies, for a discussion that will focus on compliance and the types of privacy and security measures your company should be aware of, as well as tips and methods for implementing these measures. This is especially vital if your workers were (and still are!)