Remove Compliance Remove Encryption Remove Government Remove Security
article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

Regulatory compliance and data privacy issues have long been an IT security nightmare. And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have been at the forefront of corporate concerns. But those aren’t the only laws or regulations that affect IT security teams.

article thumbnail

Navigating Compliance: Understanding India's Digital Personal Data Protection Act

Thales Cloud Protection & Licensing

Navigating Compliance: Understanding India's Digital Personal Data Protection Act madhav Thu, 05/09/2024 - 05:30 In August 2023, the Indian Parliament passed a piece of landmark legislation, the Digital Personal Data Protection (DPDP) Act, marking a significant shift in India's data protection landscape.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Encryption Software for 2022

eSecurity Planet

It’s been a couple of decades since data tapes delivered by trucks made encryption a standard enterprise cybersecurity practice. Yet even as technology has changed, sending and receiving data remains a major vulnerability, ensuring encryption’s place as a foundational security practice. What is Encryption?

article thumbnail

GDPR compliance checklist

IBM Big Data Hub

The General Data Protection Regulation (GDPR) is a European Union (EU) law that governs how organizations collect and use personal data. However, GDPR compliance is not necessarily a straightforward matter. The stakes are high, and the GDPR imposes significant penalties for non-compliance.

GDPR 89
article thumbnail

How encryption can help address Cloud misconfiguration

Thales Cloud Protection & Licensing

How encryption can help address Cloud misconfiguration. So, whichever way you go, there is, across time, a very high likelihood that a CSP's encryption, tokenization, or key management scheme will be misconfigured either by the CSP itself or by the CSP user. Bring your own encryption (BYOE). Tue, 11/16/2021 - 06:15.

article thumbnail

Securing AI Deployments: Striking the Balance

OpenText Information Management

If it’s not accurate, accessible, and secure, organizations won’t get the desired results. Since AI relies on data to learn and improve, organizations must ensure their data is accurate, accessible, and secure. They must also build a solid data foundation, including a governance framework, to take full advantage of the benefits of AI.

article thumbnail

How Microsoft and Thales Offer Enhanced Security and Compliance for Microsoft Office 365

Thales Cloud Protection & Licensing

How Microsoft and Thales Offer Enhanced Security and Compliance for Microsoft Office 365. Our discussion covered topics like customer concerns and expectations, data sensitivity, regulatory compliance, and fully integrated security through DKE and Luna Key Broker. CSP foreign government compliance obligations.