Don't let panic negate the need for privacy best practices. Keep privacy at the core of your pandemic response plan and build a program that is time sensitive, scalable,...
|
|
Don't let panic negate the need for privacy best practices. Keep privacy at the core of your pandemic response plan and build a program that is time-sensitive, scalable,...
|
|
Use the Data Process Mapping Tool Lite to map out the flow of personal data. Apply your privacy framework to new and/or temporary business processes involving personal...
|
|
Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company...
|
|
In an interview with Info-Tech analysts, privacy expert Dr. Ann Cavoukian explains why Air Canada's recent mandatory temperature check policy to screen for COVID-19...
|
|
PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor. Thus, allowing such data...
|
|
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created...
|
|
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at...
|
|
The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for...
|
|
When challenging and unprecedented situations occur, the initial reaction is born out of survival instincts. These short-term solutions often negate a calculated set of...
|
|