Remove B2B Remove Education Remove Government Remove Security
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Byron is the founder and editor-in-chief of The Last Watchdog on Privacy & Security.

article thumbnail

Connecticut Enacts Consumer Privacy Law

Hunton Privacy

The CTDPA exempts certain entities, including, for example, state and local government entities, nonprofits, higher education institutions, financial institutions subject to the Gramm-Leach-Bliley Act (“GLB”), and qualifying covered entities and business associates subject to the Health Insurance Portability and Accountability Act (“HIPAA”).

Privacy 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Privacy Law Overhaul – Proposition 24 Passes

Data Matters

The law says little else about automated decision-making rights other than to direct that regulations be issued governing these opt-out and access rights. The CPRA, however, appears to foreclose the option to cure, as it states, “the implementation and maintenance of reasonable security procedures and practices pursuant to Section 1798.81.5

Privacy 122
article thumbnail

Creating a holistic 360-degree “citizen” view with data and AI

IBM Big Data Hub

The key is making sure all this data is transparent and responsibly governed for privacy and security. In B2B or B2C circles, a 360-degree view of customers or citizens offers a holistic, comprehensive picture of a person based on data collected from all touch points.

B2C 52
article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

SaaS security checklists are frameworks for protecting data and applications in cloud-based environments. They serve as benchmarks for upholding strong security requirements, evaluating existing tools, and assessing potential solutions. We’ve designed a customizable template to help you develop your own SaaS security checklist.

article thumbnail

How Telcos are embracing data to become the back-end infrastructure for organizations

Reltio

Telcos will be working a lot more with the B2B sector. They are also doing a lot around privacy and regulation because if the data is kept in the cloud they need to ensure it is secure. If you know more about a customer (B2B or B2C) you’ll know more about how to retain their business and make it profitable. About Sarit Bose.

MDM 52
article thumbnail

Nation-State-Sponsored Attacks: Not Your Grandfather’s Cyber Attacks

Data Matters

Attorney General described a recent takedown of a Russian government-sponsored botnet called Cyclops Blink before it was weaponized and caused damage. and foreign government agencies. government reported a significant rise in hacks perpetrated against private companies by nation-state-sponsored threat actors. 19, 2022).