The Ireland-based Data Protection Commission (DPC), the supervisory authority for the General Data Protection Regulation (GDPR), has released a guide to GDPR breach notifications to help controllers understand their obligations regarding notification and communication.
All about Virtualization and Cloud Security | Recent Articles:
Legacy security designed to protect physical endpoints is no match for software-defined environments, such as cloud infrastructures. In fact, not even a modern endpoint security solution can, on its own, cover the full spectrum of cloud-workload protection requirements, use cases and workload types. This has opened the flood-gates to a new breed of cybersecurity solutions called “Cloud Workload Protection Platforms” (CWPPs), and the market is ripe for the picking, according to Gartner.
New York is joining other US states in expanding its definition of a data breach to include unauthorized “viewing” of data. The amendment also expands the definition of private information.
Costs associated with a data breach have surged this year to $3.92 million, according to IBM’s latest Cost of a Data Breach study. And more than a third of it stems from lost business.
As data protection authorities start to dish out GDPR-related fines, businesses in the US must learn to better communicate their data-handling practices to customers. The pressure is on for businesses to seed trust in their user base.
Companies worldwide expect to boost cybersecurity investments by 34% in the next fiscal year, after raising them 17% the current year, new research shows. The reason? More than one in 10 firms loses upwards of $10 million after falling victim to a cyber attack.
In only three days, businesses big and small with customers in the European Union have been told to cough up a cumulated €315 million in penalties after failing to comply with the GDPR rulebook.
A combination of outdated computer systems, lack of investment, and a deficit of skills and awareness in cyber security is placing NHS hospitals at risk, researchers have warned.
Preventative security technologies like firewalls and application blacklisting aren’t always enough to safeguard an organization’s IT infrastructure. Businesses often face internal threats, so a cybersecurity strategy must include tools and processes for rapid detection and response. However, strategies often don’t.
Data breaches, a rare occurrence not too long ago, have become the norm, forcing enterprises worldwide to adopt a paranoid posture with regards to the likelihood of disruption and loss of business.
Faced with a growing army of cyber criminals constantly after their data, businesses are investing heavily in new technology and professionals to close the cybersecurity gap. While this sounds promising, most organizations are making very slow progress towards cyber resilience.
Cybercriminals exposed 2.8 billion consumer data records in 2018, costing U.S. organizations over $654 billion. Healthcare, financial services and government were the sectors hardest hit by cyberattacks, new research shows.