A clear security posture helps to represent an organization’s cybersecurity capabilities. There are several indicators that can help to gauge where your organization belongs within the risk management structure.
Regulations like GDPR and CCPA are generating high volume of data subject requests around how and why data is being used. How should companies manage them and stay in compliance?
A trend is growing where online travel agencies and travel aggregators are unleashing armies of bots to run price scraping operations which may in certain cases, hoard tickets and prevent humans from making travel arrangements.
Corporate identity theft is on the rise and its effects could potentially crash a successful business. What makes it easier to motivate the perpetrators compared to personal identity theft and what techniques do they use?
The IT security industry is facing a new wave of hacking through smart technology, machine learning, and artificial intelligence where hackers will unleash unethical tactics to target and manipulate individuals and organizations.
The best way to ensure your business is prepared to face cybersecurity threats is to foster a culture of cybersecurity awareness. Convenience is not the same thing as laziness.
As authorities push for more tracking, more surveillance to deal with the COVID-19 pandemic, where do we draw the line to ensure that civil liberties are not eroded?
The responsibilities of the privacy office include building and maintaining an effective privacy program consisting of policies, procedures, and other mechanisms, sometimes referred to as governance. Privacy office support software can assist the individuals who are responsible for these tasks.