GDPR
Meta fined US$275 million following enquiry into April 2021 data leak
November 29 by Olivia PowellMeta faces a “range of corrective measures” for failing to adequately meet GDPR standards
How to choose a data discovery solution
May 25 by Cyber Security Hub EditorLearn what effective data discovery is and how it can ensure you are compliant with a broad range of data privacy regulation
Mitigate Threats with Data Risk Assessments
July 21 by Elizabeth MixsonBefore an organization can re-engineer its approach to data privacy, it must first understand its current state. Similar to cybersecurity risk assessments, a data risk assessment (DRA) is a systemized...
The Hidden Challenges of Data Retention
June 16 by Elizabeth MixsonHaving the right data retention policies in place not only protects data from unauthorized access or other malfeasances, it also ensures data is primed for business usage. Furthermore, recent regulati...
Is Data Privacy Evolving Into Data Rights? Checking-In On Data Rights Management (DRM)
May 26 by Elizabeth MixsonAs a result of data laws such as GDPR, processing data subject access requests (DSAR) have surged. In fact, in the year following the implementation of GDPR, customer data solutions provider Segment e...
U.S. Data Privacy Legislation: Proposed & Pending Regulations
May 05 by Elizabeth MixsonIn a quest to provide a global overview of cyber-related legislation and regulation we have focused on Regulation through Global Data Protection and Security Laws, and APAC Data Protection and Securit...
Global Data Protection and Security Laws At-A-Glance: Regulation
April 28 by Elizabeth MixsonPersonal data protection and privacy law is rapidly evolving across the world. While some regions, such as the EU (GDPR), have adopted a more rigid and comprehensive approach, other countries are embr...
Data Privacy 2021: How Data Privacy is Becoming a Strategic Priority
April 14 by Elizabeth MixsonData privacy is rapidly evolving from a compliance challenge to a strategic objective. Here’s what you need to know.
The Cost of Privacy Report
October 21 by Seth AdlerA recent survey conducted by Okta across 6 countries, reveals a deepening online ‘identity crisis’. The report findings are stark and the story they tell is important for anyone planning and implemen...
Preparing Cyber Security Leaders For Regulation And Compliance
March 02 by Jeff OrrNot all industries have faced regulatory compliance and reporting requirements as a course of conducting business operations. Under-regulated sectors can take steps from a cyber security perspective t...
Recognizing Access Management As A Cyber Security Framework And Process Control
February 24 by Jeff OrrIdentity and Access Management (IAM) and Privileged Access Management (PAM) are critically important disciplines. Cyber Security Hub examines some of the most impactful strategies that threat actors e...
Incident Of The Week: Leak Discloses UN Data Breach From 2019
February 07 by Kayla MatthewsHackers broke into dozens of United Nations (UN) servers in July of last year, and UN officials kept quiet about it. The worst part? PII was stolen and employees were kept in the dark. Cyber Security...