The Bletchley Declaration, signed by 29 nations, sets forth a shared understanding of AI's opportunities and risks, emphasizing collective management and safe deployment of the technology.
Senior cybersecurity professionals reveal their number one frustration is the inability to continuously measure enterprise-wide security posture and identify control failures.
Only 32 percent of companies say they are fully GDPR-compliant, according to the Demandbase/Demand Metric report. The report does show that marketers are aware of the importance of data security, with nearly 75 percent saying they will invest in technology to improve their approach to data privacy. But they may need training first, with 57 percent […]
Augmenting its efforts to protect the nation’s critical assets from cybersecurity threats as well as protect individuals’ privacy, the National Institute of Standards and Technology (NIST) has issued a draft update to its Risk Management Framework (RMF) to help organizations more easily meet these goals. Source: NIST Updates Risk Management Framework to Incorporate Privacy Considerations […]
Hundreds of initiatives have been launched over the past several years to tackle the issue of internet-of-things security in the design phase for devices. AgeLight Advisory Group Managing Director Craig Spiezle spent the time to review more than 1,500 documents to see what those initiatives hoped to achieve. AgeLight has released the fruits of Spiezle’s […]
On Monday Data Privacy Monitor published its fourth annual Data Security Incident Response Report, which provides an analysis of the more than 560 cyber incidents handled by the team in 2017. Reflecting on the increasingly sophisticated nature of attacks, the aggressiveness by regulators in researching breaches and the expectations of highly developed responses, the report […]
The Australian business landscape is awash with new regulations and obligations surrounding privacy and data use. Between the mandatory data breach notification scheme, new EU data protection regulations and the Australian government’s announcement of a new consumer data right, chief technology officers and in-house counsel could be forgiven for hiding underneath their desks with a […]
Risk assessments are a fundamental part of any organization’s risk management process. But many organizations still do not incorporate true risk assessments into their information-security planning, even though doing so makes good business sense and is required by many standards and regulatory frameworks (the HIPAA Security Rule, PCI-DSS, and the NY Department of Financial Services […]