Tag: GDPR
-
Regulatory Landscape: DMARC, GDPR, DORA What Businesses Need to Know in 2025
Originally published at Regulatory Landscape: DMARC, GDPR, DORA & What Businesses Need to Know in 2025 by Amanda E. Clark. In 2025, compliance is key to remaining in … First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/regulatory-landscape-dmarc-gdpr-dora-what-businesses-need-to-know-in-2025/
-
Is your password manager truly GDPR compliant?
Passwords sit at the core of every critical system, but many organizations still overlook how fragile their password workflows can be. When something goes wrong, security … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/20/passwork-password-manager-gdpr-compliant/
-
Is your password manager truly GDPR compliant?
Passwords sit at the core of every critical system, but many organizations still overlook how fragile their password workflows can be. When something goes wrong, security … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/20/passwork-password-manager-gdpr-compliant/
-
Google Play Store’s privacy practices still confuse Android users
Privacy rules like GDPR and CCPA are meant to help app stores be clearer about how apps use your data. But in the Google Play Store, those privacy sections often leave people … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/20/google-play-store-privacy-practices/
-
European Commission ‘simplification’ proposal would weaken GDPR, AI regulations
Under the proposal, the EU would weaken data protection rules by delaying when regulations governing high-risk AI systems take effect and allowing companies to use personal data for AI training without prior consent from users in most circumstances. First seen on therecord.media Jump to article: therecord.media/european-commission-proposal-gdpr-ai-simplification
-
EU sets out plans to cut red tape on digital
Changes have been proposed to simplify AI Act compliance for smaller businesses, easier cyber security reporting and tweaks to GDPR First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366634698/EU-sets-out-plans-to-cut-red-tape-on-digital
-
Overcome the myriad challenges of password management to bolster data protection
Tags: access, attack, authentication, automation, backup, best-practice, breach, business, cio, cloud, compliance, control, cyberattack, data, data-breach, gartner, GDPR, identity, infrastructure, international, kaspersky, mfa, password, risk, software, technology, tool, update[1]And both enterprises and small and mid-sized businesses have already made significant investments in authentication, access controls and identity and access management (IAM).[2]But these investments are not effective without robust passwords. At the same time, password management is a cost for IT and security teams, and an inconvenience for technology users.The scale of the problem…
-
JWT Governance for SOC 2, ISO 27001, and GDPR, A Complete Guide
how proper JWT governance helps your organization stay compliant with SOC 2, ISO 27001, and GDPR. Explore best practices, governance frameworks, and how SSOJet ensures secure token management. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/jwt-governance-for-soc-2-iso-27001-and-gdpr-a-complete-guide/
-
GDPR Data Subject Rights in 2025-and Beyond
The post <b>GDPR Data Subject Rights in 2025-and Beyond</b> appeared first on Sovy. First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2025/11/gdpr-data-subject-rights-in-2025-and-beyond/
-
Unlocking Cloud Security: Introducing the New AWS Key Rotation Feature in CipherTrust Cloud Key Management
Tags: access, automation, cloud, compliance, container, control, cyber, cyberattack, data, encryption, finance, framework, GDPR, HIPAA, infrastructure, PCI, risk, service, software, strategy, threat, toolUnlocking Cloud Security: Introducing the New AWS Key Rotation Feature in CipherTrust Cloud Key Management madhav Thu, 11/13/2025 – 05:12 How Automated Key Management Empowers Customers and Elevates Data Protection Encryption Scotti Woolery-Price – Partner Marketing Manager, Thales More About This Author > How Automated Key Management Empowers Customers and Elevates Data Protection In today’s…
-
Unlocking Cloud Security: Introducing the New AWS Key Rotation Feature in CipherTrust Cloud Key Management
Tags: access, automation, cloud, compliance, container, control, cyber, cyberattack, data, encryption, finance, framework, GDPR, HIPAA, infrastructure, PCI, risk, service, software, strategy, threat, toolUnlocking Cloud Security: Introducing the New AWS Key Rotation Feature in CipherTrust Cloud Key Management madhav Thu, 11/13/2025 – 05:12 How Automated Key Management Empowers Customers and Elevates Data Protection Encryption Scotti Woolery-Price – Partner Marketing Manager, Thales More About This Author > How Automated Key Management Empowers Customers and Elevates Data Protection In today’s…
-
EU’s reforms of GDPR, AI slated by privacy activists for ‘playing into Big Tech’s hands’
Lobbying efforts gain ground as proposals carve myriad holes into regulations First seen on theregister.com Jump to article: www.theregister.com/2025/11/11/eu_leaked_gdpr_ai_reforms/
-
EU’s reforms of GDPR, AI slated by privacy activists for ‘playing into Big Tech’s hands’
Lobbying efforts gain ground as proposals carve myriad holes into regulations First seen on theregister.com Jump to article: www.theregister.com/2025/11/11/eu_leaked_gdpr_ai_reforms/
-
European Commission moves to loosen GDPR for AI and cookie tracking
AI training gets green light: The proposal directly addressed one of the most contentious issues in EU privacy law: whether companies can train AI systems using personal data.The draft stated that AI training, testing, and validation may be conducted under the GDPR’s “legitimate interest” basis, as long as companies implement safeguards such as data minimization,…
-
European Commission moves to loosen GDPR for AI and cookie tracking
AI training gets green light: The proposal directly addressed one of the most contentious issues in EU privacy law: whether companies can train AI systems using personal data.The draft stated that AI training, testing, and validation may be conducted under the GDPR’s “legitimate interest” basis, as long as companies implement safeguards such as data minimization,…
-
European Commission moves to loosen GDPR for AI and cookie tracking
AI training gets green light: The proposal directly addressed one of the most contentious issues in EU privacy law: whether companies can train AI systems using personal data.The draft stated that AI training, testing, and validation may be conducted under the GDPR’s “legitimate interest” basis, as long as companies implement safeguards such as data minimization,…
-
European Commission moves to loosen GDPR for AI and cookie tracking
AI training gets green light: The proposal directly addressed one of the most contentious issues in EU privacy law: whether companies can train AI systems using personal data.The draft stated that AI training, testing, and validation may be conducted under the GDPR’s “legitimate interest” basis, as long as companies implement safeguards such as data minimization,…
-
Digital health can’t scale if cybersecurity falls behind
Tags: access, ai, attack, breach, cloud, compliance, control, cyber, cyberattack, cybersecurity, data, detection, encryption, endpoint, exploit, framework, GDPR, governance, government, healthcare, HIPAA, identity, infection, intelligence, malicious, network, nist, phishing, privacy, ransomware, regulation, resilience, risk, risk-management, strategy, technology, threat, training, virus, vulnerability, zero-trustThe unique vulnerabilities of AI systems: Traditional security frameworks are not enough for AI. Attacks on algorithms take subtler forms. I often explain to my clients that when you corrupt data, you corrupt intelligence. Data poisoning occurs when malicious data is inserted into the training process, teaching the AI to make wrong decisions later. Imagine…
-
Digital health can’t scale if cybersecurity falls behind
Tags: access, ai, attack, breach, cloud, compliance, control, cyber, cyberattack, cybersecurity, data, detection, encryption, endpoint, exploit, framework, GDPR, governance, government, healthcare, HIPAA, identity, infection, intelligence, malicious, network, nist, phishing, privacy, ransomware, regulation, resilience, risk, risk-management, strategy, technology, threat, training, virus, vulnerability, zero-trustThe unique vulnerabilities of AI systems: Traditional security frameworks are not enough for AI. Attacks on algorithms take subtler forms. I often explain to my clients that when you corrupt data, you corrupt intelligence. Data poisoning occurs when malicious data is inserted into the training process, teaching the AI to make wrong decisions later. Imagine…
-
Digital health can’t scale if cybersecurity falls behind
Tags: access, ai, attack, breach, cloud, compliance, control, cyber, cyberattack, cybersecurity, data, detection, encryption, endpoint, exploit, framework, GDPR, governance, government, healthcare, HIPAA, identity, infection, intelligence, malicious, network, nist, phishing, privacy, ransomware, regulation, resilience, risk, risk-management, strategy, technology, threat, training, virus, vulnerability, zero-trustThe unique vulnerabilities of AI systems: Traditional security frameworks are not enough for AI. Attacks on algorithms take subtler forms. I often explain to my clients that when you corrupt data, you corrupt intelligence. Data poisoning occurs when malicious data is inserted into the training process, teaching the AI to make wrong decisions later. Imagine…
-
Clearview AI faces criminal heat for ignoring EU data fines
Noyb says New York-based facial recognition biz flouted GDPR orders and kept scraping anyway First seen on theregister.com Jump to article: www.theregister.com/2025/10/28/noyb_criminal_charges_clearview/
-
Volvo’s recent security breach: 5 tips to speed incident response while preserving forensic integrity
Tags: access, automation, breach, business, cio, ciso, cloud, compliance, control, cyber, cybersecurity, data, data-breach, detection, endpoint, finance, framework, gartner, GDPR, guide, incident, incident response, insurance, metric, mitigation, nist, resilience, risk, risk-management, saas, security-incident, siem, soar, supply-chain, vulnerabilityIdentify and catalog your evidence sources in advance (endpoints, memory, logs, cloud assets)Stage scripts or agents that can snapshot memory and archive logs immediately when an IR trigger firesMake forensic collection part of containment, not something you tack on afterwardModern approaches and even NIST’s updated guidance emphasize that evidence gathering should begin during, not after,…
-
Volvo’s recent security breach: 5 tips to speed incident response while preserving forensic integrity
Tags: access, automation, breach, business, cio, ciso, cloud, compliance, control, cyber, cybersecurity, data, data-breach, detection, endpoint, finance, framework, gartner, GDPR, guide, incident, incident response, insurance, metric, mitigation, nist, resilience, risk, risk-management, saas, security-incident, siem, soar, supply-chain, vulnerabilityIdentify and catalog your evidence sources in advance (endpoints, memory, logs, cloud assets)Stage scripts or agents that can snapshot memory and archive logs immediately when an IR trigger firesMake forensic collection part of containment, not something you tack on afterwardModern approaches and even NIST’s updated guidance emphasize that evidence gathering should begin during, not after,…
-
Ransomware recovery perils: 40% of paying victims still lose their data
Tags: access, attack, authentication, backup, breach, business, ceo, crypto, cyber, cybersecurity, data, data-breach, encryption, extortion, finance, GDPR, group, incident response, insurance, leak, mfa, privacy, ransom, ransomware, resilience, risk, risk-management, service, threat, updateAdditional recovery pressures: Modern ransomware attacks now routinely involve double or triple extortion whereby attackers threaten to leak stolen data or launch distributed denial of service (DDoS) attacks even after payment.This fundamentally changes the calculus on what victims can expect in cases where they decide to make a ransomware payment, which more often than not…
-
Ransomware recovery perils: 40% of paying victims still lose their data
Tags: access, attack, authentication, backup, breach, business, ceo, crypto, cyber, cybersecurity, data, data-breach, encryption, extortion, finance, GDPR, group, incident response, insurance, leak, mfa, privacy, ransom, ransomware, resilience, risk, risk-management, service, threat, updateAdditional recovery pressures: Modern ransomware attacks now routinely involve double or triple extortion whereby attackers threaten to leak stolen data or launch distributed denial of service (DDoS) attacks even after payment.This fundamentally changes the calculus on what victims can expect in cases where they decide to make a ransomware payment, which more often than not…
-
Experian Fined Euro2.7m For GDPR Breach in Netherlands
The Dutch Data Protection Authority issued Experian a Euro2.7m for GDPR violations including excessive collection of personal data First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/experian-fined-gdpr-breach/

