article thumbnail

The Week in Cyber Security and Data Privacy: 30 October – 5 November 2023

IT Governance

According to the security company Resecurity , which discovered the listing, the data included victims’ name, age, gender, address, passport number and Aadhaar number (a 12-digit government identification number). It secured its systems, notified law enforcement and began investigating the incident. Reading rooms remain open.

article thumbnail

Vera to Power Canon Solutions America’s New Security Solutions and Services Strategy

Info Source

– Canon Solutions America’s Enterprise Services and Solutions group will leverage Vera’s advanced data protection and rights management platform for secure data capture, detailed auditing, and data privacy. MELVILLE, N.Y. and PALO ALTO, Calif., a wholly owned subsidiary of Canon U.S.A.,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Improve your data relationships with third parties

Collibra

Regulators are focusing on the data relationships financial services organizations have with third parties, including how well personal information is being managed. Data – especially personal data – must be kept safe and secure and be able to be used operationally after an incident.

article thumbnail

Datacenter Colocation in Northern Virginia for Small, Medium Businesses - Business Requirements and Reasons for Local IT Outsourcing

Interactive Information Management

Particularly the technologies used to main “high availability, highly-secure” systems, with redundancies and overlapping capabilities at every level. It’s also a risk to those who depend on you to protect their data, privacy and investment in custom knowledge and services. Without sleeping. Who depends on your IT systems?

IT 45
article thumbnail

Podcast Episode 123: HaveIBeenPwned’s Troy Hunt on Marriott’s Big Mess and GreatHorn on the Asymmetric Threat of Email

The Security Ledger

And: you’ve heard of Business Email Compromise attacks but what about Business Service Impersonation scams? Marriott International acquired more than a chain of hotels when it bought Starwood three years ago: it acquired a whopper of a security compromise. Part 1: Marriott’s Big Mess.