Online counseling provider BetterHelp is set to come under two decades of privacy monitoring by the U.S. Federal Trade Commission after settling allegations that it violated users' privacy by sharing identifying information with social media platforms including Facebook.
The Biden administration has unveiled its new national cybersecurity strategy, detailing top challenges facing the U.S. and plans for addressing them. Goals include minimum security requirements for critical infrastructure sector organizations and liability for poor software development practices.
Okta Identity Governance has enjoyed success in its first quarter of global availability as businesses unify access management and governance. Okta is surprised by the amount of traction its governance offering has gained with large enterprises and in competitive bake-offs, says CEO Todd McKinnon.
The European agency responsible for overseeing consistent application of privacy law on the continent says it has reservations about the legal framework underpinning commercial trans-Atlantic data flows as the framework moves toward formal acceptance by the European Commission.
The Federal Trade Commission is warning Amazon and One Medical to abide by their promises to protect consumers' data privacy. The statement comes in the wake of Amazon's $3.9 billion purchase of the primary healthcare on-site and virtual services provider.
In a post-pandemic world the new norm means that organizations have shifted to hybrid / remote work, taking your organization’s most important entities outside of the network: your data, applications, and users. As a result, traditional perimeter-based tools like network firewalls and VPNs are proving more and more...
According to Gartner, by 2026, 50% of organizations will prioritize advanced data security features for inspection of data at rest and in motion as a selection criterion for SSE, up from 15% in 2021.
Needless to say the shifting to the cloud and the hybrid working has moved private apps, users, and data outside...
As per a study in 2022, India is seeing an evident shift to Zero Trust security approaches with 26% of Indian enterprise organizations already adopting the Zero Trust Model and 8% intending to adopt in the next few months.
Needless to say the shifting to the cloud and the hybrid working has moved private apps,...
With signs pointing to a global economic downturn, cybersecurity organizations are already thinking about managing budgets and doing more than less. Four CISOs share a wide range of belt-tightening tips, from putting the squeeze on your vendors and suppliers to training and hiring from within.
CyberMaxx has landed the former CEO of cloud security vendor Threat Stack to bring offensive and defensive cybersecurity services together on one platform. The Nashville-based firm has tasked Brian Ahern with creating managed detection and response bundles with offensive and defensive capabilities.
In today’s global economy, many companies have employees distributed across multiple locations, such as headquarters and branch offices. Due to the Covid-19 pandemic, remote working from home has also increased greatly in recent times. Wherever they are, a company’s staff will need to access IT services,...
Zero Trust Network Access For Dummies is a special edition eBook and consists of five chapters that explore the following:
The changing security landscape, the basics of ZTNA, and the need to move beyond ZTNA 1.0
How ZTNA 2.0 addresses the limitations of current ZTNA solutions
The critical success factors...
The Australian government says it will centralize its approach to securing federal agencies by appointing a coordinator to head the new National Office for Cyber Security within the Department of Home Affairs. The appointment comes after back-to-back major data breaches.
With the U.S. COVID-19 public health emergency expected to end in May, the government is set to scrutinize telehealth providers for HIPAA violations. That’s why healthcare firms should review their telehealth platforms and vendors, says privacy attorney Adam Greene of Davis Wright Tremaine.
A top U.S. government official urged industry to become more conscientious over cybersecurity by preventing vulnerabilities from accumulating before products ship. CISA head Jen Easterly called for a more assertive role for government and an industrywide shift to memory-safe programming languages.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.