Remove category cyber-insurance
article thumbnail

Delaware amends data breach notification law

Data Protection Report

A “breach of security” will now exclude unauthorized acquisition of encrypted data unless the acquisition includes, or is reasonably believed to include, the encryption key and the person who owns or licenses the data has a reasonable belief that the encryption key could render that personal information readable or useable.

article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

According to statistics from the FBI’s 2021 Internet Crime Report , complaints to the Internet Crime Complaint Center (IC3) have been rising since 2017. To talk about which targets scammers pick, we’ll be looking at two categories: individuals and businesses. of cyber attacks IBM handled. billion in reported losses. Individuals.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

“But the emails” – companies’ SEC filings reflect ransomware risks

Data Protection Report

Similarly, Repsol addresses ransomware in its 40-F filings as one of the cyber risk factors for the company. IBM’s most recent 10-K identifies ransomware as a cyber risk that could impact the company’s business by causing “the loss of access to critical data or systems.”. General ransomware risk disclosures.

Risk 40
article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

The growing volume and severity of cyber-attacks directed against public companies has caught the attention of federal regulators and investors. More and more, directors are viewing cyber-risk under the broader umbrella of corporate strategy and searching for ways to help mitigate that risk.

article thumbnail

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

In the aftermath of the Cambridge Analytica scandal, and in the footsteps of Europe’s General Data Protection Regulation (“GDPR”), California privacy advocates introduced a ballot initiative on October 12, 2017 called “The Consumer Right to Privacy Act of 2018” (No. The ballot initiative largely mirrored what is now the language in the CCPA.

Privacy 58
article thumbnail

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

In the aftermath of the Cambridge Analytica scandal, and in the footsteps of Europe’s General Data Protection Regulation (“GDPR”), California privacy advocates introduced a ballot initiative on October 12, 2017 called “The Consumer Right to Privacy Act of 2018” (No. The ballot initiative largely mirrored what is now the language in the CCPA.

Privacy 58
article thumbnail

Top Cybersecurity Startups to Watch in 2022

eSecurity Planet

Most traditional tools used for investigating cyber attacks cannot assess potential impacts on these environments. Series A SenseOn 2017 London, UK 61 $26.4 Series A GitGuardian 2017 Paris, France 63 $56.0 Evervault is on a mission to make encrypting sensitive data seamless with its security toolkit for developers.