Data Privacy
Is Data Privacy Evolving Into Data Rights? Checking-In On Data Rights Management (DRM)
May 26 by Elizabeth MixsonAs a result of data laws such as GDPR, processing data subject access requests (DSAR) have surged. In fact, in the year following the implementation of GDPR, customer data solutions provider Segment e...
Data Privacy 2021: How Data Privacy is Becoming a Strategic Priority
April 14 by Elizabeth MixsonData privacy is rapidly evolving from a compliance challenge to a strategic objective. Here’s what you need to know.
The Cost of Privacy Report
October 21 by Seth AdlerA recent survey conducted by Okta across 6 countries, reveals a deepening online ‘identity crisis’. The report findings are stark and the story they tell is important for anyone planning and implemen...
The Intersection Of Crises & Regulation Meets In Cyber Security
September 29 by Seth AdlerThe session draws parallels from 1887 to now, the current global infrastructure of privacy laws and the overall affect on cyber security.
Preparing Cyber Security Leaders For Regulation And Compliance
March 02 by Jeff OrrNot all industries have faced regulatory compliance and reporting requirements as a course of conducting business operations. Under-regulated sectors can take steps from a cyber security perspective t...
The Value Of Separating Compliance And Enterprise Cyber Security Goals
January 16 by Jeff OrrCyber Security Hub created a market report offering end-user “best practices” for data privacy legislation and stack GDPR up against other international measures on compliance. Further, it provides in...
Large Software Companies Using Data Privacy As A Competitive Advantage
December 03 by Jeff OrrOn the eve of CCPA legislation taking effect, large companies are extending protections under these laws to their U.S. customers. Cyber Security Hub enlisted the help of security and data privacy lega...
Connected Robots Driving Demand For Cyber Security In Industrial Manufacturing
October 17 by Jeff OrrSecurity concerns in industrial manufacturing are increasing. Robotics systems are connected to other robots, to enterprise IT systems and the cloud, which enables access to internal systems and data...
Incident Of The Week: Cloud Misconfiguration Exposes 20 Million Ecuador Citizen Records
September 20 by Jeff OrrEnterprises are not the only entities that can experience cloud misconfigurations. In this Incident Of The Week, detailed family, financial and vehicle information of Ecuador’s citizens was discovered...
Enterprise InfoSec Meetup Grows New York’s Cyber Community
August 08 by Jeff OrrIn part one of this Task Force 7 Radio podcast Episode 95 recap, guest David Raviv, founder of the NY Enterprise InfoSec Meetup group, provided recommendations to those looking to get into the cyber s...
Relationship Goals For The Enterprise & Cyber Security Startup
August 08 by Jeff OrrIn part two of this Task Force 7 Radio podcast Episode 95 recap, guest David Raviv, founder of the NY Enterprise InfoSec Meetup group, shared a few cyber security career lessons, discussed the challen...
Cloud Security Market Report: Exploring The Right Enterprise Strategy
July 29 by Jeff OrrThis Cyber Security Hub market report examines the ins and outs of today’s hybrid cloud setups so enterprises can better understand the technology and vulnerabilities, in order to develop the right cl...