Tagged as: #cybersecurity

15 Aug
2018

Understanding Compliance: California Consumer Privacy Act

Understanding Compliance: California Consumer Privacy Act By now, you’ve likely heard of the California Consumer Privacy Act, or the CaCPA or CCPA for short. This law is intended to provide California residents with greater control over their personal information when it takes effect on January 1, 2020. As with most

27 Jul
2018

How Will GDPR Impact AI-Driven Platforms?

How Will GDPR Impact AI-Driven Platforms? Artificial Intelligence (AI) is top of mind for organizations worldwide because machine learning is replacing manual, human-based computation with higher efficiency and better security at scale. Over forty-seven percent of digitally mature organizations, as well as those that have advanced digital practices, indicate that

06 Jun
2018

General Data Protection Regulation: Pseudonymization vs. Anonymization

General Data Protection Regulation: Pseudonymization vs. Anonymization What is Pseudonymization? The General Data Protection Regulation (GDPR) is now in effect, with strong requirements to protect the personal data of European Union (EU) data subjects “by design and by default.“ Though the GDPR doesn’t contain detailed technical requirements for data security,

23 Apr
2018

Why is IoT Sensor Data Security Such a Hot Topic for Organizations Worldwide? Part 2 of 2

Why is IoT Sensor Data Security Such a Hot Topic for Organizations Worldwide? Part 2 of 2 In part 1 of this blog series we covered how the IoT (Internet of Things) creates a vast multi-point attack surface that can be the Achilles heel of connected devices, potentially revealing personal

29 Mar
2018

Leveraging ISO/IEC Data Security Standards to Prepare for GDPR

Leveraging ISO/IEC Data Security Standards to Prepare for GDPR The deadline for your organization to get compliant for the EU GDPR (European Union General Data Protection Regulation) is right around the corner. Understanding where your data is today, and developing a process to provide consent or the right to be

12 Feb
2018

Understanding the IoT Digital Attack Surface and Threat Mitigation

Understanding the IoT Digital Attack Surface and Threat Mitigation The IoT (Internet of Things) continues to grow, which in turn expands your organization’s attack surface. That’s because the more “things” you connect to your business network, the more data is collected and the more endpoints there are to safeguard. According

03 Nov
2017

Format Preserving Encryption and NIST 800-38G.  What You Need to Know.

Format Preserving Encryption and NIST 800-38G.  What You Need to Know. In April (2017) a cryptanalytic attack was discovered on the FF3 method for Format Preserving Encryption (FPE) by NIST (National Institute of Standards and Technology). As a result, FF3 was declared no longer suitable as a general purpose FPE

12