Remove tag consumer-protection
article thumbnail

Fuel digital transformation with data security and data privacy

Collibra

In the first half of 2020, our worlds became nearly entirely digital. This change makes us, as consumers, vulnerable to hacks and breaches. But the general public is not the only ones concerned about data security. Many businesses are using this time to optimize their data and technology investments. Data breaches.

article thumbnail

Doing Well By Doing The Right Thing: How The CCPA Is Good For Businesses And Consumers

Reltio

The California Consumer Privacy Act (CCPA), the sweeping piece of legislation designed to enhance the privacy rights of California consumers, was signed into law more than 18 months ago and enacted on January 1 of this year. Noncompliance could carry a hefty price tag. Some might become laws by the end of 2020.

GDPR 78
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What’s new in OpenText Axcelerate

OpenText Information Management

Self-service data processing – Choose between traditional white-glove data upload and processing to Axcelerate or our new self-service processing and upload where circumstances require immediate review of relatively small volumes of data. Undo Tagging Operations. Let’s take a closer look. PostgreSQL.

article thumbnail

Fuel Data Intelligence with data governance

Collibra

In our professional lives, we generate more data with every term we search, email we send, and product or service we provide to our customers. The International Data Corporation (IDC) predicts that more the 59 zettabytes will be created, collected and consumed in 2020 ; that’s a lot of data that can be either wasted or applied intelligently.

article thumbnail

The advantage of active data governance

Collibra

In our professional lives, we generate more data with every term we search, email we send, and product or service we provide to our customers. The International Data Corporation (IDC) predicts that more the 59 zettabytes will be created, collected and consumed in 2020 ; that’s a lot of data that can be either wasted or applied intelligently.

article thumbnail

IoT Cybersecurity: 5 Major Vulnerabilities and How to Tackle Them

Security Affairs

Here are five significant cybersecurity vulnerabilities with IoT in 2020. Furthermore, consumers believe that companies and services have the responsibility of keeping their data secure. Both companies and consumers need to work proactively to protect their integrity. The Threat is Definitely Real.

IoT 131
article thumbnail

10 Best CASB Security Vendors of 2022

eSecurity Planet

With the adoption of cloud-based applications and services growing exponentially, especially as a result of the dramatic growth in remote work in response to the COVID-19 pandemic, more than ever organizations need to protect their data and IT systems from cloud-based threats. Recognition for Broadcom. Censornet Features. Forcepoint.

Security 140