Remove category
Remove Analysis Remove Insurance Remove Marketing Remove Passwords
article thumbnail

Delaware amends data breach notification law

Data Protection Report

Norton Rose Fulbright has been shortlisted for ‘Cyber law firm of the year’ at the Insurance Insider Cyber Ranking Awards 2017. We are honored to be included as a nominee, and believe that it reflects our leading experience within the cyber insurance sector.

article thumbnail

California Enacts Broad Privacy Laws Modeled on GDPR

Data Matters

An analysis of the bill prepared by the California Assembly before the vote also indicated that AB 375 was intended to address controversies concerning third-party sale of personal information acquired from social media without data subjects’ authorization. Specific categories defined as personal information include. geolocation data.

GDPR 79
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Enacts Broad Privacy Protections Modeled on GDPR

Data Matters

An analysis of the bill prepared by the California Assembly before the vote also indicated that AB 375 was intended to address controversies concerning third-party sale of personal information acquired from social media without data subjects’ authorization. Specific categories defined as personal information include. geolocation data.

GDPR 60
article thumbnail

34 Most Common Types of Network Security Protections

eSecurity Planet

In this guide, we’ll walk you through some of the most common types of network security protections, how they work, and the top products and services to consider in each category. Unlike EDR, NDR focuses less on actual devices and more on network traffic behavior analysis via packet data. Also read: What is Network Security?

Security 117
article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Board-management discussions about cyber risk should include identification of which risks to avoid, which to accept, and which to mitigate or transfer through insurance, as well as specific plans associated with each approach. Principle 5. Authentication and Lifecycle Management. Federation and Assertions.

article thumbnail

Top Cybersecurity Startups to Watch in 2022

eSecurity Planet

We’ll start with the top 10 overall and then look at other noteworthy startups in a number of markets. With sizable growth in a short span and the market presence to show for it, SECURITI.ai Cyble Vision can integrate with an existing SIEM or SOAR and provide incident response, threat analysis, and vulnerability management.