Remove category
Remove Encryption Remove Information Security Remove Meeting Remove Security
article thumbnail

Counting Down to the EU NIS2 Directive

Thales Cloud Protection & Licensing

Counting Down to the EU NIS2 Directive madhav Thu, 05/23/2024 - 05:16 Our recently released 2024 Data Threat Report showed a direct correlation between compliance and cyber security outcomes. NIS2 adds digital service providers, waste management, pharmaceutical and labs, space, and public administration to the ‘Essential’ sectors category.

article thumbnail

How to implement the General Data Protection Regulation (GDPR)

IBM Big Data Hub

Yet many organizations still struggle to meet compliance requirements, and EU data protection authorities do not hesitate to hand out penalties. The only processing operations exempt from the GDPR are national security and law enforcement activities and purely personal uses of data. Irish regulators hit Meta with a EUR 1.2

GDPR 79
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ICO issue fine of £4.4 to Interserve for security failings

DLA Piper Privacy Matters

The ICO found that Interserve had failed to put appropriate technical and organisational measures in place to secure personal data (in contravention of Articles 5(1)(f) and 32 GDPR) for a period of ~20 months. The databases were encrypted and rendered unavailable to Interserve. The Incident. Digest of points to note in the MPN.

article thumbnail

UK government cracks down on cyber security

IT Governance

To improve cyber risk governance among public-sector departments and their suppliers, the UK government has issued a series of minimum cyber security standards that will be incorporated into the Government Functional Standard for Security. Departments will be responsible for ensuring suppliers also meet the new standards.

article thumbnail

New SEC Cybersecurity Rules Could Affect Private Companies Too

eSecurity Planet

Securities and Exchange Commission (SEC) strongly advised public companies to improve their cybersecurity. While the new security proposals have not yet become law, cybersecurity managers can begin to prepare metrics and audits that will not only help comply with those laws, but can also help create positive change now.

article thumbnail

Data management sets the next phase of zero-trust

Collibra

Nowadays zero-trust is being recognized as a principle and a best practice that can be applied to broad aspects of security, accelerated by industry’s innovations. It sets out clear visions and specific actions around the five pillars of security: identity, devices, networks, application & workloads, and data.

article thumbnail

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

On July 10, 2017, the Cyberspace Administration of China published a new draft of its Regulations on Protecting the Security of Key Information Infrastructure (the “Draft Regulations”), and invited comment from the general public. View our English translation of the Draft Regulation.