Remove category
Remove Events Remove Meeting Remove Privacy Remove Security
article thumbnail

GUEST ESSAY: Addressing data leaks and other privacy, security exposures attendant to M&As

The Last Watchdog

Such consolidation across markets is good news for customers and vendors alike in terms of market growth and maximizing security investments. The FBI recently issued a warning that ransomware gangs are targeting companies during “time-sensitive financial events”, such as mergers and acquisitions. Post-Close Risks.

Privacy 265
article thumbnail

ICYMI –December in privacy and cybersecurity

Data Protection Report

December tends to be a busy time for everyone, so you may have missed a privacy update or two. For those making this quiz a competitive event, we have included a tie-breaker/bonus question.) Which one advanced so that it can be proposed at the next CPPA board meeting for a vote to proceed to formal rulemaking?

Privacy 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Privacy Law Overhaul – Proposition 24 Passes

Data Matters

The results are in, and California voters have approved the California Privacy Rights Act (CPRA) which was listed on the ballot as Proposition 24. Even so, with these and other new requirements, the CPRA does not go as far as some consumer privacy advocates had hoped it would.

Privacy 122
article thumbnail

Cloud Security Fundamentals: Understanding the Basics

eSecurity Planet

Cloud security fundamentals are the core requirements that ensure data protection, regulatory compliance, and access management in a cloud environment. Understanding cloud security challenges and knowing the cloud security tools available in the market significantly contribute to enhanced cloud security.

Cloud 117
article thumbnail

Regulatory Update: NAIC Summer 2021 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2021 National Meeting (Summer Meeting) August 14-17, 2021. This post summarizes the highlights from this meeting in addition to interim meetings that were held during July in lieu of taking place during the Summer Meeting.

article thumbnail

IaaS vs PaaS vs SaaS Security: Which Is Most Secure?

eSecurity Planet

Cloud computing services, such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS), each have unique security concerns. IaaS involves virtualized computing resources over the internet, with users responsible for securing the operating system, applications, data, and networks.

Security 111
article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

Network security architecture is a strategy that provides formal processes to design robust and secure networks. Effective implementation improves data throughput, system reliability, and overall security for any organization. Network Elements Networks connect physical and virtual assets and control the data flow between them.

Security 117