Remove category
Remove Data Remove Events Remove Information Security Remove Security
article thumbnail

China Releases Draft Regulations on Network Data Security Management

Hunton Privacy

On November 14, 2021, the Cyberspace Administration of China (“CAC”) released for public comment its draft Regulations on Network Data Security Management (the “Draft Regulations”). In addition, the Draft Regulations add new requirements related to data processing activities. Data Handler and Entrusted Party.

Security 116
article thumbnail

Why Data Visibility is Important for Security

Thales Cloud Protection & Licensing

Why Data Visibility is Important for Security. Today, organizations are struggling to control their data environments. The amount of data created is forecasted to grow and be spread in a wide diverse ecosystem: the cloud, on premises, in data lakes and big data. The Added Value of Data Visibility.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to implement the General Data Protection Regulation (GDPR)

IBM Big Data Hub

The General Data Protection Regulation (GDPR), the European Union’s landmark data privacy law, took effect in 2018. Yet many organizations still struggle to meet compliance requirements, and EU data protection authorities do not hesitate to hand out penalties. Irish regulators hit Meta with a EUR 1.2 billion fine in 2023.

GDPR 76
article thumbnail

China Releases National Standard on Personal Information Security

Hunton Privacy

On January 25, 2018, the Standardization Administration of China published the full text of the Information Security Technology – Personal Information Security Specification (the “Specification”). The Specification divides personal information into two categories: personal information and sensitive personal information.

article thumbnail

NYDFS releases major update to Part 500 cybersecurity requirements for financial services companies

Data Protection Report

Noticeably, covered entities are now subject to new requirements imposing heightened responsibilities on Chief Information Security Officers (“CISOs”) and more specific and prescriptive requirements in relation to governance, risk assessments, and notifications to the NYDFS. f), is sufficient to trigger this new notice requirement.

article thumbnail

Pwn2Own Toronto 2022 hacking competition. Samsung S22 hacked

Security Affairs

White hat hackers that participated in the competition hacked the Samsung Galaxy S22 smartphone twice during the first day of the hacking competition, the 10th edition of the consumer-focused event. Samsung S22 hacked appeared first on Security Affairs. The team earned $100K cash and 10 Master of Pwn points. Pierluigi Paganini.

article thumbnail

GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

The Last Watchdog

For organizations looking to improve their security posture, this is causing confusion and vendor fatigue, especially for companies that don’t have a full time Chief Information Security Officer. Traditional channels for choosing the right security solutions are proving to be increasingly ineffective.