Cybersecurity / Privacy regulations

Sort Options:

U.S. state data privacy laws: What you need to know

U.S. state data privacy laws: What you need to know

The article discusses the growing landscape of U.S. state data privacy laws, highlighting bipartisan support for regulations that protect consumer information. With 11 states currently enforcing laws and more on the way, marketers face complex compliance challenges.


What is the current landscape of U.S. state data privacy laws?
Currently, 11 U.S. states have comprehensive data privacy laws in place, with more states expected to enact similar laws by 2026. These laws vary by state but generally provide consumers with rights to access, delete, and opt out of the sale of their personal information. The lack of a federal law means businesses must comply with a patchwork of state regulations, creating complex compliance challenges.
Sources: [1], [2]
How do U.S. state data privacy laws differ from federal regulations?
U.S. state data privacy laws differ significantly from federal regulations because there is no comprehensive federal privacy law. State laws, such as those in California, Colorado, and Texas, impose specific requirements on businesses, including opt-out mechanisms, data protection assessments, and consent for sensitive data processing. Federal laws, like HIPAA and COPPA, are sector-specific and do not provide the same level of consumer protection as state laws.
Sources: [1], [2]

10 April, 2025
MarTech

Why Data Privacy Isn't the Same as Data Security

Why Data Privacy Isn't the Same as Data Security

Businesses that conflate data privacy with data security risk regulatory scrutiny and potential breaches, which can quickly undermine consumer trust. The article emphasizes the importance of clearly understanding these concepts to safeguard both compliance and customer confidence.


What is the main difference between data privacy and data security?
Data privacy focuses on the rights of individuals to control their personal data, ensuring it is handled in compliance with laws and regulations. Data security, on the other hand, involves measures to protect data from unauthorized access, breaches, or damage, regardless of whether the data is personal or not.
Sources: [1], [2]
Why is it important for businesses to distinguish between data privacy and data security?
Distinguishing between data privacy and data security is crucial for businesses to ensure compliance with regulations and maintain consumer trust. Misunderstanding these concepts can lead to regulatory scrutiny and potential data breaches, which can undermine customer confidence.
Sources: [1], [2]

10 April, 2025
darkreading

Worried About Your Data Security and Privacy? You're Not Alone

Worried About Your Data Security and Privacy? You're Not Alone

A recent survey highlights growing concerns over data misuse by companies and the government. The publication outlines effective strategies individuals can adopt to safeguard their online information and enhance personal data security.


No insights available for this article

09 April, 2025
CNET

Industry Asks for Clarity on Proposed HIPAA Cybersecurity Rules

Industry Asks for Clarity on Proposed HIPAA Cybersecurity Rules

Healthcare and IT security experts express concerns that proposed amendments may be impractical for a sector struggling with limited resources and reliance on outdated technology, highlighting the need for more feasible solutions to enhance security measures.


No insights available for this article

08 April, 2025
darkreading

Digital transformation without cybersecurity is a risk that public sector can’t afford

Digital transformation without cybersecurity is a risk that public sector can’t afford

The UK government is advancing digital transformation in public services, emphasizing efficiency and AI solutions. However, cybersecurity risks from third-party suppliers and nation-state attacks pose significant threats, necessitating robust security measures and continuous monitoring to protect sensitive citizen data.


No insights available for this article

28 March, 2025
TechRadar

VPN services may soon become a new target of EU lawmakers after being deemed a "key challenge"

VPN services may soon become a new target of EU lawmakers after being deemed a "key challenge"

The EU's High-Level Group identifies VPNs and end-to-end encryption as significant challenges for law enforcement investigations. Experts urge caution, emphasizing the need to balance data access with fundamental rights and cybersecurity, amid concerns over potential state surveillance.


No insights available for this article

28 March, 2025
TechRadar

Adapting the UK’s cyber ecosystem

Adapting the UK’s cyber ecosystem

The evolving cybersecurity landscape poses significant challenges, with 87% of organizations facing breaches in 2023. The UK is enhancing its defenses through new legislation, but ongoing assessment and adaptation are crucial to address emerging threats effectively.


No insights available for this article

28 March, 2025
TechRadar

How CISOs can meet the demands of new privacy regulations

How CISOs can meet the demands of new privacy regulations

Privacy is becoming a top priority for CISOs, driven by new state regulations requiring detailed risk assessments. Proactive measures, including rapid assessments and third-party risk management, are essential for compliance and safeguarding sensitive data against evolving cyber threats.


No insights available for this article

24 March, 2025
TechRadar

China issues new regulations on facial recognition technology, effective June 1

China issues new regulations on facial recognition technology, effective June 1

China's Cyberspace Administration and Ministry of Public Security have introduced new regulations for facial recognition technology, effective June 1. These rules aim to standardize data processing and enhance personal information protection, outlining key requirements and oversight responsibilities.


No insights available for this article

24 March, 2025
TechNode

Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providers

Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providers

Regulatory compliance is becoming crucial for small and mid-sized businesses (SMBs), which face challenges in adhering to data protection laws like HIPAA and GDPR. The article highlights the struggles SMBs encounter due to limited IT resources and evolving regulations.


No insights available for this article

20 March, 2025
The Hacker News

Privacy must be a business priority: the urgent need for investment and action

Privacy must be a business priority: the urgent need for investment and action

As data protection becomes essential, privacy professionals face underfunding and staffing challenges, leaving organizations vulnerable to cyber threats. Experts emphasize the need for strategic investment in privacy teams to enhance compliance and safeguard customer trust in an evolving digital landscape.


No insights available for this article

18 March, 2025
TechRadar

Year Of The CISO: Secure-By-Design, Regulations And Consolidation

Year Of The CISO: Secure-By-Design, Regulations And Consolidation

Cybersecurity is increasingly acknowledged by boards, executives, and regulators as essential for modern business operations. This recognition underscores its critical role in safeguarding organizations in today's digital landscape, highlighting the importance of robust security measures.


No insights available for this article

17 March, 2025
Forbes - Innovation

Cybersecurity Challenges in Cross-Border Data Transfers and Regulatory Compliance Strategies

Cybersecurity Challenges in Cross-Border Data Transfers and Regulatory Compliance Strategies

Cross-border data transfers are essential for global business but face significant challenges from diverse cybersecurity laws and rising cyber threats. Organizations must navigate complex regulations and implement robust security measures to protect sensitive data during international transactions.


No insights available for this article

11 March, 2025
Security Affairs

Balancing Cybersecurity Accountability & Deregulation

Balancing Cybersecurity Accountability & Deregulation

Deregulation presents opportunities for growth and innovation, but it also introduces new risks. The publication emphasizes the need for a proactive and accountable approach to security to navigate these challenges effectively.


No insights available for this article

07 March, 2025
darkreading

How Data Test Engineers Ensure Compliance and Security With Automation

How Data Test Engineers Ensure Compliance and Security With Automation

Modern organizations in data-centric environments must prioritize compliance and data security, adhering to regulations like GDPR and CCPA. Engineers leverage automation strategies to enhance compliance and strengthen data security frameworks, safeguarding confidential information and avoiding significant penalties.


No insights available for this article

07 March, 2025
DZone.com

Cyber resilience under DORA – are you prepared for the challenge?

Cyber resilience under DORA – are you prepared for the challenge?

The Digital Operational Resilience Act (DORA) mandates EU financial institutions to enhance cybersecurity and operational resilience. Compliance is crucial, as non-adherence risks severe penalties and reputational damage, prompting a shift towards proactive, automated security strategies and robust identity management.


No insights available for this article

06 March, 2025
TechRadar

Under the hood of data sovereignty

Under the hood of data sovereignty

The rise of cloud computing has transformed data management, prompting businesses to navigate complexities of data sovereignty. Organizations are increasingly focusing on compliance, encryption, and security measures to protect sensitive data while adapting to evolving technologies like AI and quantum computing.


No insights available for this article

05 March, 2025
TechRadar

The hidden costs of data subject access requests (DSARs) on privacy

The hidden costs of data subject access requests (DSARs) on privacy

As data privacy laws evolve, the surge in Data Subject Access Requests (DSARs) poses significant challenges for businesses, costing an average of $1.5k per request. Companies are urged to adopt efficient practices to enhance compliance and build customer trust.


No insights available for this article

26 February, 2025
TechRadar

Cybersecurity: Benefits and Best Practices

Cybersecurity: Benefits and Best Practices

Cybercriminal activity is on the rise, making cybersecurity crucial for protecting digital assets across all sectors. As the regulatory landscape evolves, organizations must prioritize robust cybersecurity measures to safeguard against inevitable attacks.


No insights available for this article

19 November, 2024
Cybersecurity | TechRepublic

Cybersecurity is a data challenge, and better search technology is key to improving visibility and action

Cybersecurity is a data challenge, and better search technology is key to improving visibility and action

Summary Not Available


No insights available for this article

16 May, 2022
Elastic Blog

An unhandled error has occurred. Reload 🗙