All Data Privacy articles – Page 42
-
Blog
BrandProtect Unveils threatSMART Cyber-Security Solution
BrandProtect, a provider of cyber-threat detection and risk mitigation solutions, this week unveiled threatSMART, the latest generation of its comprehensive suite of enterprise cyber-security services. threatSMART combines comprehensive, automated external cyber-threat monitoring, advanced analysis by the BrandProtect team of military-grade threat analysts, powerful new reporting, and numerous other usability and ...
-
Article
Enforcement Action May Be Omen of SEC’s Cyber-Security Plans
An investment adviser firm in St. Louis has become the (painful) test subject for the SEC’s attitude on cyber-security matters. The case, observers say, is a warning that the agency is moving away from guidance and toward enforcement. So what will the SEC consider to be “reasonable” security efforts? Will ...
-
Article
Mending the Data Privacy Gaps of the EU Safe Harbor Ruling
Image: Three weeks after Europe’s top court demolished the 15-year-old Safe Harbor Program to transfer personal data from Europe to the United States, thousands of U.S. companies that used the program are still scrambling to fill data privacy gaps. “To lean back and see how things play out is not ...
-
Blog
Ridge Global Partners With NAVEX Global to Address Gaps in Cyber-Security Programs
Ethics and compliance software and services provider NAVEX Global and risk management company Ridge Global recently announced a partnership that will initially focus on delivering online training courseware to help companies educate their workforces on the growing risks associated with cyber-security and arm them with the tools they need to ...
-
Blog
Recall Simplifies Information Governance With CommandIG
Recall Holdings Limited, an information management solutions provider, recently announced the general availability of Recall CommandIG, a secure cloud-based or on-premise information governance solution that enables companies to easily govern paper records and digital information wherever it resides and address the challenges of secure collaboration. More inside.
-
Blog
Transforming the Cyber-Security Paradigm
Though data breaches are inevitable, companies still remain too focused on fortification rather than response, failing to adopt to the harsh realities of rapidly emerging international and multifarious cyber-security threats. Inside, columnist John Reed Stark recommends a three-step cyber-security transformation for companies to undertake to combat recent rapidly evolving cyber-dangers.
-
Blog
MediaPro Launches New Adaptive Phishing Simulator
MediaPro this week announced two new tools to support its existing Adaptive Awareness Framework: the Adaptive Phishing Simulator and the Adaptive Knowledge Assessment. Both tools are part of MediaPro’s full suite of products designed to address companies’ evolving needs toward implementing a truly integrated security awareness program. More inside.
-
Blog
Double Trouble in Internal Investigations After Schrems
Image: Last week another huge shift in the compliance world happened: the Schrems decision by the European Court of Justice, finding that the previously presumed European Union Safe Harbor regime is invalid. For the anti-corruption compliance practitioner, the decision is double-trouble when you consider it in light of the recent ...
-
Article
SEC Faces New Obstacles in e-Discovery Efforts
As the SEC ferrets out inside traders and Ponzi schemers of the Internet Age, more voices are saying the agency has too much leeway to gather electronic records against investigation targets. Congress is mulling legislation to curb SEC power to get e-mail from Internet service providers; federal judges are applying ...
-
Article
Data Security Impasse Overturns Safe Harbor Program
An Austrian student’s displeasure with Facebook has invalidated the longstanding trans-Atlantic Safe Harbor program for international data transfers. That complaint, originally about Facebook’s alleged cooperation in U.S. government spying, has reached the highest court and Europe and overturned 15 years of data privacy rules. Companies are left with few viable ...
-
Resource
e-Book: The Evolving Era of Big Data
Data has broken free from the confines of computers and mobile devices, making it hard for pretty much anyone to control what is collected, how it is aggregated, and how it can be used. To make matters worse, a new breed of connected devices is becoming a far more difficult ...
-
Blog
ACE Introduces Global Cyber Facility
ACE Group, a multiline property and casualty insurer, last week announced the launch of ACE’s Global Cyber Facility, which goes beyond standard risk transfer by incorporating a comprehensive risk management solution into a single policy purchase. More inside.
-
Blog
PwC Names Privacy Innovation Strategist
PwC, U.S., has appointed Peter Cullen as privacy innovation strategist. With over 20 years of experience in corporate governance, privacy and risk management, Cullen provides strategic leadership to organizations, helping them leverage Big Data to achieve business value. More inside.
-
Article
Calls for More Data Sharing to Step Up Terrorism Fight
Washington wants Corporate America to step up its attention to terrorism risk. That was the message at a recent congressional hearing, the latest instance of voices saying business and government should cooperate to uncover terrorists’ sophisticated financing schemes. “Most of the early warning signs reside with the private sector, and ...
-
Blog
K2 Intelligence Enhances Regulatory Compliance and Cyber Defense Team
K2 Intelligence, an investigative, compliance and cyber-defense services firm, recently appointmented two cyber-security veterans to its compliance and cyber defense team. Dana Syracuse will join the firm on Sept. 10 and Vincent D’Agostino joined on Aug. 31. More inside.
-
Article
More Cyber-Security Guidelines for Govt Contractors
Image: The Obama Administration is considering new cyber-security guidance that would effectively impose stringent new reporting obligations on government contractors. That means more due diligence on third parties, and a review of contract language to see who is responsible for what. “[E]verybody is going to need to get their cyber-house ...
-
Blog
ACC Launches Information Governance Committee
The Association of Corporate Counsel (ACC), a global legal association representing 40,000 in-house counsel in 90 countries, last week announced the launch of a new practice area committee. The ACC Information Governance Committee will foster engagement and collaboration on corporate legal departments’ role in data protection and collection, discovery procedures ...
-
Blog
Accellion Launches Governance Package for Kiteworks
Accellion, a provider of private cloud solutions for secure file sharing and collaboration that ensure data security and compliance, recently announced that it has added new security and governance capabilities to its kiteworks secure content platform. Accellion's kiteworks governance package is designed to assist enterprise organizations in demonstrating compliance with ...
-
Article
CCOs Playing a Stronger Role in Data Privacy Practices
Image: As data privacy laws proliferate, they are creating a web that traps how corporations use personal data in their operations. The challenge for compliance officers: how to play a more strategic role and ensure your business doesn’t get stuck. “The inclusion of the CCO function in defining controls related ...
-
Article
SEC Pushes New Limits on Cyber-Security, Securities Fraud
Another byproduct of life in the cyber-security age: The SEC is redefining insider trading to focus more on improper trading, even if you are a thief mining a company for inside information without actually working there. The misconduct—called, yes, “outsider trading”—seems to be an SEC-enforceable offense so far, and it ...