All Data Privacy articles – Page 42

  • Blog

    Chubb launches cyber ERM solution for clients in Europe

    2016-03-04T15:00:00Z

    Chubb, which has been acquired by the ACE Group, this week announced the launch of Cyber Enterprise Risk Management, as the company continues to invest in its cyber risk capabilities across Europe.

  • Blog

    Vera and RFA partner to improve data security for hedge funds and asset managers

    2016-02-23T11:30:00Z

    Vera and RFA (Richard Fleischman and Associates), a financial private cloud provider for the asset management community, this month announced a partnership that will make Vera’s advanced data security technology available to hedge funds, private equity firms, and asset managers in the United States, the United Kingdom, and beyond.

  • Blog

    Apple, the FBI and a terrorist’s iPhone

    2016-02-19T10:45:00Z

    As the FBI continues its investigation into the deadly San Bernadino terror attack from last December, it has run into an unlikely adversary in Apple, which has refused the Bureau’s requests to defeat the security measures of one of the terrorists’ iPhones. While the legal struggle over this raises the ...

  • Blog

    Recommind Integrates Microsoft Office 365 Into Axcelerate

    2016-02-08T14:45:00Z

    Recommind, an advanced analytics provider, announced that it has integrated Microsoft Office 365 into the newest version of Axcelerate, its cloud-based e-Discovery platform. The collaboration streamlines discovery by enabling joint customers to easily and effectively cull data in the Office 365 environment before exporting it into Axcelerate for total visibility ...

  • Blog

    EU, U.S. Agree on New Safe Harbor Framework

    2016-02-02T16:00:00Z

    The European Union and the United States have agreed on a new framework that will allow for trans-Atlantic data flows between Europe and the United States. The new arrangement will provide stronger obligations on U.S. companies to protect the personal data of Europeans and stronger monitoring and enforcement by the ...

  • Article

    Preparing for the EU’s new Data Protection Rule

    2016-01-26T09:00:00Z

    Sweeping changes to the EU’s data protection laws means new compliance headaches for any U.S. company that collects and handles data on citizens of the European Union. “It’s a game changer, primarily because it sets standards that many companies haven’t had to worry about,” said Hilary Wandall, associate vice president ...

  • Article

    Liability Protections Included in New Cyber-Security Law

    2016-01-20T14:30:00Z

    You may have not even noticed it, but discreetly tucked into the massive omnibus spending bill signed into law last month is a provision that effectively makes it safer for companies to share cyber-threat information with one another—but critics argue the bill doesn’t go far enough to ease privacy concerns.

  • Blog

    RMS Launches New Data Standard for Managing Cyber Insurance

    2016-01-19T09:15:00Z

    Ahead of the February launch of its new suite of cyber-risk management tools, RMS today released its recently developed Cyber Exposure Data Schema. The ‘open standard’ data schema will provide the insurance industry with a systematic and uniform way to capture cyber exposure data and manage cyber accumulation risk.

  • Blog

    PwC’s Cyber-Security Practice Adds New Principal

    2016-01-19T09:00:00Z

    PwC US has named Patrick Hynes as a principal in the advisory cyber-security practice, focused on cyber-crime and breach response. He is based in PwC’s Los Angeles office.

  • Blog

    The SEC’s Newly Proclaimed Search Warrant Authority

    2016-01-12T10:30:00Z

    The Securities and Exchange Commission has broad subpoena powers that this dedicated corps of highly credentialed professionals—inspired by a noble sense of mission, and rich with a long history of investor advocacy—tries to use in the best way possible. But when it comes to issuing subpoenas for electronic storage devices, ...

  • Article

    Mitigating Cyber-Threats From the Inside Out

    2016-01-12T09:30:00Z

    As attacks on corporate networks become more common, companies are getting more adept at protecting their most valuable assets against cyber-threats outside the company, but it’s the insider threats that continue to elude many. Inside, we walk through the difficult part of insider-threat programs: not just creating the program and ...

  • Blog

    PwC’s Cybersecurity Practice Adds New Principal

    2016-01-08T11:45:00Z

    PwC US has appointed Patrick Hynes as a principal in the advisory cybersecurity practice, focused on cybercrime and breach response. He is based in PwC’s Los Angeles office. Hynes joins PwC with a strong background in cyber-security.

  • Blog

    Finance Teams Play Growing Role in Cyber-Risk Mitigation

    2015-12-18T11:15:00Z

    According to a survey of 389 financial executives conducted by the American Institute of CPAs, 73 percent said they are being asked to take on a larger role in defending their companies from emerging cyber-risks, while another six percent said cyber-risk mitigation has become the primary responsibility of the finance ...

  • Blog

    The Big Challenge in New EU Data Protection Law: Values

    2015-12-17T13:15:00Z

    Image: This week European officials agreed to a final text for a sweeping new data protection law. Compliance officers in the United States should brace themselves: not only does the legislation threaten huge fines and complicate corporate marketing efforts enormously; it underlines the fundamentally differing views Europeans and Americans have ...

  • Blog

    Cordium Launches New Cyber-Security Training Video

    2015-12-11T14:30:00Z

    Cordium, a global provider of compliance consulting, accounting, tax and software to the financial services industry, has launched a cyber-security training video to help firms protect against breaches.

  • Blog

    What Makes a Good ‘Pen Tester’

    2015-12-08T09:00:00Z

    Penetration testing is the exercise of testing a company’s cyber-security defenses, and finding the right “pen tester” to do that can be difficult. Learn how to find the right blend of capable, trustworthy, and innovative cyber-security professionals. More inside.

  • Resource

    e-Book: Keeping Your Corporate Data Safe Under Lock and Key

    2015-11-30T11:00:00Z Provided by

    Around the world, governments and regulators are responding to the massive trove of personal data companies are amassing and a rash of data security breaches with new strict guidelines, regulations, and laws. In response, privacy and compliance programs are increasingly at an intersection. In recent times, however, many companies have ...

  • Article

    Cloud Security Is a Challenge for Users and Providers

    2015-11-24T13:30:00Z

    As more cloud storage providers evolve from consumer-based products to enterprise-grade services, compliance challenges are evolving along with them. Before entering into a service contract, companies must determine whether their data will be safe and all is in compliance with a growing list of regulations and security frameworks. The added ...

  • Article

    The Key Cyber-Security Question: What Is ‘Reasonable’?

    2015-11-10T09:45:00Z

    Regulators often say they want “reasonable” precautions when spelling out expectations on cyber-security. But with a plethora of guidance and frameworks to consider, what does that mean—and does “reasonable” depend on industry and company size? A small summit meeting of cyber-security voices debated that question in Boston recently; we have ...

  • Blog

    SAS Launches New Stress-Testing; Cyber-Security Solutions

    2015-11-06T10:30:00Z

    At its business leaders conference last month, SAS announced the launch of two new products: SAS Stress Testing solution suite and SAS CyberSecurity. Details inside.