Remove 10
Remove 2012 Remove Privacy Remove Security Remove Training
article thumbnail

My 7 top security publications from the ICO

Data Protector

Given what can only be described as an omnishambles of security breaches, is there much more that the ICO can do to warn data controllers of the risks they should take account of? Guidance on data security breach management (Dec 2012). Privacy in mobile apps – guidance for app developers (Dec 2013). Probably not.

Security 120
article thumbnail

Vulnerability Recap 4/1/24: Cisco, Fortinet & Windows Server Updates

eSecurity Planet

While most issues can be fixed through prompt patching and updating, a few remain unfixed and may require more significant changes to the security stack to block possible attacks. March 22, 2024 Emergency Out-of-Band Windows Server Security Updates Type of vulnerability (or attack): Memory leak. out of 10), and calls it Shadow Ray.

Libraries 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TD Bank Agrees to Settlement to Resolve Multistate Investigation into 2012 Data Breach

Hunton Privacy

On October 10, 2014, TD Bank, N.A. entered into an assurance of voluntary compliance (“Assurance”) with a multistate group of nine attorneys general to settle allegations that the company violated state consumer protection and personal information safeguards laws in connection with a 2012 data breach. View the Assurance.

article thumbnail

10 Best CASB Security Vendors of 2022

eSecurity Planet

Any cloud-based infrastructure needs a robust cloud access security broker (CASB) solution to ensure data and application security and integrity. . Cloud access security brokers are increasingly a critical component of the Secure Access Service Edge (SASE) as edge and cloud security become the newest pain points.

Security 141
article thumbnail

Leveraging generative AI on AWS to transform life sciences

IBM Big Data Hub

Commercial: Marketing content creation, patient experience, rep onboarding & training sales enablement and knowledge hub. Manufacturing : Quality control and inspection, operator / lab tech training conversational search through SOP’s, content creation and more. Why IBM Consulting for generative AI on AWS?

article thumbnail

The Burden of Privacy In Discovery

Data Matters

With the proliferation of social media platforms and other new technologies has come a renewed legal focus on privacy. Could a party, for instance, decline to produce, review, or even collect certain types of data due to privacy concerns? But what about other contexts? In this essay, Robert D.

Privacy 97
article thumbnail

Wednesday LTNY 2018 Sessions: eDiscovery Trends

eDiscovery Daily

Sessions in the main conference tracks include: 9:00 – 10:00 AM: Legaltech Keynote – The ESI of Today and the ESI of Tomorrow. How to manage consumers’ expectations on privacy with these new ESI sources. How to leverage data security practices to ensure appropriate protection of personal data under the GDPR.