article thumbnail

New Leak Shows Business Side of China’s APT Menace

Krebs on Security

i-SOON’s “business services” webpage states that the company’s offerings include public security, anti-fraud, blockchain forensics, enterprise security solutions, and training. “Definitely whoever did this planned it, because you can’t get all this information all at once.”

article thumbnail

California Consumer Privacy Act: The Challenge Ahead — Key Terms in the CCPA

HL Chronicle of Data Protection

We thus focus here on detailing some of the CCPA’s key definitional terms, organized into topical categories. The CCPA applies to businesses, service providers, and other third parties. The CCPA does not cover every business. The second threshold for a “business” is ambiguous. Who must comply with the CCPA?

Privacy 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to prioritize data strategy investments as a CDO

IBM Big Data Hub

At IBM, we embarked on a data strategy to transform the enterprise into a data-first business, with AI infused into every key business process. Our data insights sharpened our definition of what AI meant to an enterprise, which also fed directly back into our business strategy.

article thumbnail

China issues Personal Information Security Specification

Data Protection Report

Such requirements give rise to significant compliance issues for business operations in China. We set out some guidance in relation to such issues. Expanded scope of personal information. The entity is also obligated to get individuals’ prior consent on the collection of personal information.

article thumbnail

NYDFS proposes significant cybersecurity regulation amendments

Data Protection Report

The certification would also need to include the identification of, and the remedial efforts planned and underway to address, any noncompliance, as well as a timeline for implementation of those remedial efforts. Cybersecurity Risk Assessments.

article thumbnail

#ModernDataMasters: Tony Saldanha, President, Transformant

Reltio

Tony Saldanha is the President of Transformant and a globally recognized information technology and shared services executive. You are a proponent of outcomes-based processes – what part can or could data management play in their definition and execution? What was your route into IT and data management?

article thumbnail

Datacenter Colocation in Northern Virginia for Small, Medium Businesses - Business Requirements and Reasons for Local IT Outsourcing

Interactive Information Management

Managing this risk is bigger than your business, and probably isn’t part of your core business skills or capabilities. There’s Great Help Available, Nearby “IT outsourcing” is a loaded phrase, with many definitions.

IT 45