August, 2023

Remove category
article thumbnail

CPPA Issues Draft CPRA Regulations on Risk Assessment and Cybersecurity Audit

Hunton Privacy

On August 29, 2023, the California Privacy Protection Agency (“CPPA”) Board issued draft regulations on Risk Assessment and Cybersecurity Audit (the “Draft Regulations”). The CPPA Board will discuss the Draft Regulations during a public meeting on September 8, 2023.

Risk 114
article thumbnail

Black Hat Fireside Chat: Easy come, easy go access strengthens ‘Identity Threat Detection & Response’

The Last Watchdog

With Black Hat USA 2023 ramping up in Las Vegas next week, cybersecurity startup Trustle is championing a new product category—Identity Threat Detection & Response ( ITDR )—which aims to enhance the capabilities of legacy IAM solutions.

Access 189
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CHINA: New draft proposes more stringent requirements for processing data in the financial services industry

DLA Piper Privacy Matters

Regulated Data includes personal and non-personal data categories, but state secrets are specially carved out from the scope of Regulated Data. Access controls, storage media, backups, encryption, transfer controls and retention period must be determined based on the category, grade and level of Regulated Data.

article thumbnail

Industry analyst round up – top rankings for OpenText

OpenText Information Management

Recently, Gartner, Forrester, and IDC have placed us in several leadership positions for key enterprise software categories. Across the market segments we serve at OpenText, it’s always a delight to receive acknowledgement from some of the top firms in the industry analyst community.

Marketing 109
article thumbnail

What is a Managed Security Service Provider? MSSPs Explained

eSecurity Planet

Cybersecurity can be difficult to implement, and to make matters worse, the security professionals needed to do it right are in short supply. Organizations typically decide to outsource cybersecurity for a number of reasons: IT talent shortages make it difficult to hire and retain experienced cybersecurity professionals.

article thumbnail

How to Find & Choose IT Outsourcing Services

eSecurity Planet

Most organizations seek to eliminate these risks by outsourcing specific projects or even their full IT or cybersecurity needs. However, a search for IT outsourcing, MSP, VAR, or a similar sub-category will produce many more results about the topic than potential candidates. IT technology (Cisco Live, Palo Alto Ignite, etc.)

IT 98
article thumbnail

6 Best Threat Intelligence Feeds to Use in 2023

eSecurity Planet

Threat intelligence feeds are continually updated streams of data that inform users of different cybersecurity threats, their sources, and any infrastructure impacted or at risk of being impacted by those threats. May have redundant features with other cybersecurity tools in your existing toolset.