Please turn on your JavaScript for this page to function normally.
apple
How hard is it to address Apple’s in-app deletion requirements and implement privacy compliance?

Transcend released the results of its latest survey of technology decision makers, which assessed their readiness for Apple’s in-app deletion requirements for iOS apps that …

cloud
Cloud-native adoption shifts security responsibility across teams

Styra released a research report which explores how in sync, or misaligned, IT leaders and developers are when it comes to cloud-native technology use and security during …

Metaverse
The importance of data in the metaverse

A research from Bright Data has highlighted the importance of data in virtual environments such as the metaverse. The survey, conducted by Vanson Bourne, generated insights …

medical devices
Model contract language for medical technology cybersecurity published

Medical technology companies and health delivery organizations have a new template for agreeing on cybersecurity contractual terms and conditions to reduce cost, complexity …

hands
MSPs see cybersecurity as both a challenge and an opportunity

Kaseya announced the results of its survey which includes data about the priorities, challenges and predictions of more than 1,200 MSPs across the globe. “With COVID-19 …

Lee Garf
How wealth managers leverage behavioral intelligence tech to thwart client abuse

In this interview with Help Net Security, Lee Garf, GM of Financial Markets Compliance at NICE Actimize, explains how behavioral intelligence technology can help the finance …

bank
Bank executives mostly concerned about cybercrime

A research released by Computer Services suggests growing concerns among bank executives around recruiting and retaining talent as well as fighting cybercrime threats. In the …

CCPA
Companies woefully unprepared for CCPA compliance

Only 11% of companies are able to fully meet CCPA requirements, especially when managing Data Subject Access Requests (DSARs), according to a CYTRIO research. The research …

work
Understaffing persistently impacting enterprise privacy teams

A research from ISACA explores the latest trends in enterprise privacy — from privacy workforce and privacy by design to privacy challenges and the future of privacy. The …

cloud complexity
Why organizations should consider adopting cloud governance as code

Cloud governance, in terms of enforcing cost, compliance, and security policies tends to be a pivotal inhibitor to cloud adoption (86% of the respondents) and is a top …

Sophie Stalla-Bourdillon2
Is cloud the solution to optimized data privacy?

In this interview with Help Net Security, Sophie Stalla-Bourdillon, Senior Privacy Counsel and Legal Engineer at Immuta, talks about data privacy, what organizations can a …

2022
What to expect in 2022 privacy wise?

DeleteMe releases its privacy predictions for 2022, based on developments seen in 2020/2021 as well as original research conducted for its 2021 PII Marketplace Report. …

Don't miss

Cybersecurity news