article thumbnail

BigID Raises $60M, Eyes M&A Around Data Security, Compliance

Data Breach Today

Data Security Vendor Retains Unicorn Status With Riverwood Capital-Led Growth Round A data security firm led by a former CA Technologies executive raised $60 million to boost both organic and inorganic expansion around data and compliance.

article thumbnail

Tips on Securing Endpoints, Ensuring Compliance

Data Breach Today

Matthew Burns of HCL Software discusses securing endpoints and ensuring compliance during exceptional times in an interview following a recent series of virtual roundtables on the subject.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GDPR Compliance Used as Phishing Lure

Data Breach Today

The campaign enticed victims with subject lines indicating their email security system was not in compliance with the law, according to Area 1 Security. Campaign Designed to Steal Credentials A recently uncovered phishing campaign used the European Union's General Data Protection Regulation as a lure to steal login credentials.

article thumbnail

GUEST ESSAY: The wisdom of taking a risk-based approach to security compliance

The Last Watchdog

With estimates suggesting there are currently over 15 billion user credentials scattered across the dark web, the importance of compliance is clear to see. In spite of this, many organizations today still see compliance as a nuisance, rather than a business enabler. Strategizing compliance. Take a risk-based approach.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Bales, Esq.

article thumbnail

A Holistic Approach to Cybersecurity and Compliance

Data Breach Today

In a joint interview, Mike Ferris and Mike Brooks of Abacode, a managed cybersecurity and compliance provider, discuss how the MCCP model helps businesses implement a holistic, framework-based cybersecurity program that provides continuous security and compliance.

article thumbnail

Microsoft's Recall Stokes Security and Privacy Concerns

Data Breach Today

K ICO Announces Probe Into Microsoft Screenshot Storage Feature Microsoft's new automatic screenshot retrieval feature could enable hackers to steal sensitive information such as online banking credentials, security experts warned. data regulator will probe Recall for compliance with privacy law. Additionally, the U.K.

Privacy 288
article thumbnail

The Importance of PCI Compliance and Data Ownership When Issuing Payment Cards

This eBook provides a practical explanation of the different PCI compliance approaches that payment card issuers can adopt, as well as the importance of both protecting user PII and gaining ownership and portability of their sensitive data.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Attendees will gain actionable insights on how to manage the complexities of privacy, compliance, and governance in AI-driven environments. 📆 October 22nd, 2024 at 9:30 AM PDT, 12:30 PM EDT, 5:30 PM BST

article thumbnail

The Unexpected Cost of Data Copies

Unfortunately, data replication, transformation, and movement can result in longer time to insight, reduced efficiency, elevated costs, and increased security and compliance risk. How Dremio delivers clear business advantages in productivity, security, and performance.