A group of researchers proposed a new framework that would enable web services to share users' password hash data in an effort to reduce password reuse.
Now is the time for organizations to move forward with their GDPR readiness plans and ensure that compliance activities are embedded into their overall security strategy.
Although concern about cybersecurity risk management is at an all-time high, a recent survey revealed that less than a quarter of CIOs feel prepared to deal with an attack.
The IBM Institute for Business Value found only 36 percent of executives believed they'd be fully compliant by the GDPR enforcement date. Can a new data analyzer tool help?
The sweeping General Data Protection Regulation (GDPR) from the European Union (EU) intends to revolutionize the relationships of data holders or processors and the people associated with that data.
Meeting the European Union's GDPR compliance has been a source of continuing difficulty and discussion for businesses.
This blog shares discussion points from a recent GDPR Summit Panel where the author spoke on the topic of breach notification.
To remain General Data Protection Regulation (GDPR) compliant, you will need to make sure the right people have the right access. Explore the implications of GDPR on insider threat controls.
The first step toward achieving GDPR readiness is to locate your sensitive assets and identify weaknesses in your data security infrastructure. After all, you can't protect what you don't know.
A recent survey conducted by IBM Security and the IBM Institute for Business Value found that many organizations around the world are embracing GDPR compliance as an opportunity for innovation.