Compliance & Privacy

Remote working, compliance, and security: Building a layered defense stack

Remote working is the new normal, and with it comes challenges of compliance and security for IT pros tasked with…

3 weeks ago

Reports say eBay port scanning incoming visitors. Why?

According to several reports, eBay may be port scanning visitors to its site. While this is probably not illegal, it…

1 month ago

Compliance never sleeps: Data security concerns of remote working

In the rush to ensure remote working, data security issues may crop up in unintended ways. But even a pandemic…

2 months ago

Remote working: 10 steps to making it more secure

Remote working is one thing, but doing it securely is another — and this has become more critical than ever…

2 months ago

Security gap analysis: Four-step guide to find and fix vulnerabilities

A gap analysis may be a common assessment, but it must be carried out correctly to realize the full benefits.…

4 months ago

New Mexico sues Google for violating privacy of minors

New Mexico is suing Google for alleged privacy violations against minors, specifically that it uses its Google Education program to…

4 months ago

CCPA and GDPR: Similarities and differences you must know

The GDPR and the CCPA are both aimed at protecting privacy. Although many similarities exist between the two, there are…

5 months ago

Binding corporate rules and GDPR: A data transfer and protection solution

To comply with GDPR, many companies have adopted binding corporate rules (BCRs) as a solution for transferring personal data—and its…

5 months ago

California Consumer Privacy Act starts Jan. 1 — Are you ready?

Ready for a New Year’s hangover? If you’re a large business that’s not ready for the California Consumer Privacy Act,…

6 months ago

The four most internationally significant recent privacy laws

GDPR has been covered endlessly, but it is only one of several recent privacy laws changing the handling of confidential…

7 months ago