Tag: Data Security
-
Do You Know About the New CLOUD Act Data Regulation?
Have you heard about the new CLOUD Act data regulation? The new CLOUD Act data regulation became law as part of the recent $1.3 Trillion …
-
Most US consumers don’t trust companies to keep their data private
While a majority of the US public sees companies’ ability to keep data private as absolutely key, it has little trust in companies to do …
-
Implement the Secure Single Sign-on (SSO) Solution to Ensure Your Company Data Security with OneLogin
Security is enhanced through SSO in light of the fact that users are diminished of the various secret password trouble. Let be honest, …
-
Diversity and inclusion, data privacy and security ops will be on everyone’s mind at RSA
Monzy Merza Contributor Monzy Merza is the chief security evangelist at Splunk. More posts by this contributor The four cybersecurity terms …
-
MinerEye introduces AI-powered Data Tracker
MinerEye is launching MinerEye Data Tracker, an AI-powered governance and data protection solution that will enable companies to …
-
From GDPR to Customer Trust: Is Your Data Ready to Protect Customer Privacy?
Is it just me, or does there somehow seem to be an eerie correlation between the quickly approaching, May 25 deadline for compliance with …
-
Neighborhood Watch: Uniting the Data Security Community Through Software Development Kits
Back in the 1970s, the National Sheriffs’ Association made the Neighborhood Watch program a national initiative. The program as we know …
-
How to Make Sure Your Database Is as Secure as Fort Knox
Today, any field of study or industry has serious data needs, and with that comes a bigger requirement to store this information properly …
-
Getting Started With GDPR Compliance
There are many documents related to GDPR regulation, but they’re not always easy to understand. In Part 1 of this series, “Getting …
-
GDPR is Coming: Is Your Company Prepared?
You’ve likely heard about GDPR (General Data Protection Regulation) going into effect for EU nations on May 25. It’s less likely that your …
-
How to Create a Strong CRM Security Model With Salesforce Sharing Rules
Once you’ve learned how to control the level of access to your Salesforce data using Organization-Wide Default (OWD) settings and Role …
-
Strengthening Cybersecurity’s Weakest Links With Deep Network Insights
Like a chain forged of steel, cybersecurity is only as strong as its weakest link. But how can we gain visibility into where these …
●●●