Please turn on your JavaScript for this page to function normally.
Good
Is that health app safe to use? A new framework aims to provide an answer

A new framework for assessing the privacy, technical security, usability and clinical assurance and safety of digital health technologies has been created by the American …

chain
NIST updates guidance for cybersecurity supply chain risk management

The National Institute of Standards and Technology (NIST) has updated its guidance document for helping organizations identify, assess and respond to cybersecurity risks …

consumer
Companies poorly prepared to meet CCPA, CPRA and GDPR compliance requirements

CYTRIO released findings from additional independent research it conducted during Q1 2022 on the state of companies’ readiness to comply with the California Consumer Privacy …

BYOD
60% of BYOD companies face serious security risks

When employees began bringing shiny, new smartphones into the office in the late 2000s, many business and IT leaders spotted an opportunity. They recognized the …

face
Consumers feel data leakage is inevitable so many have stopped caring

Imperva releases findings from a global study on consumer perceptions of data privacy and trust in digital service providers. In an increasingly digital world, consumers feel …

cloud hand
Independent security audits are essential for cloud service providers. Here’s why

As more companies outsource IT infrastructure to third-party providers and adopt cloud-based collaboration tools, the need for partners that deliver strong protection and …

healthcare
49% of small medical practices don’t have a cyberattack response plan

Sophisticated cyberattacks are crippling healthcare providers by posing a threat to core functions and patient privacy, according to Software Advice survey. Findings reveal …

data
The challenges of consumer data and PII usage

In this Help Net Security video, Nong Li, CEO at Okera, talks about the challenges of using and managing consumer data and personally identifiable information (PII). As …

user
Web3 and the future of data portability: Rethinking user experiences and incentives on the internet

Tech conversations are now peppered with a new, contentious buzzword: Web3, and we’re all likely to hear a lot more of it in the coming years. It’s an umbrella term for …

apple
How hard is it to address Apple’s in-app deletion requirements and implement privacy compliance?

Transcend released the results of its latest survey of technology decision makers, which assessed their readiness for Apple’s in-app deletion requirements for iOS apps that …

biohazard
2021 COVID bounce: Malware has returned with a vengeance

At a particularly perilous moment for privacy and security, Malwarebytes’ research uncovered a COVID bounce, a massive 2021 resurgence of cyberthreats across multiple …

idea
Top data governance challenges and strategies for high-growth startups

Hyper-growth startups face a unique set of challenges when it comes to secure data access. Their priority is to drive rapid innovation, scale their customer base and grow …

Don't miss

Cybersecurity news