In case you missed our press release on the Critical Data Security Trends for 2019, we're sharing the list here on the blog for the ease of our readers. What's on your priority list? We'd love to hear your feedback. More Data, More Devices and More Regulations Mean New Approaches to Data Security
If you missed part 1 or 2 of our GDPR blog series, you can find them here: Part 1: A GDPR Primer: What You Need to Know Part 2: GDPR: A Driver for Digitalization In this post, we will outline a practical approach for achieving GDPR compliance with the help of technology, specifically
European Identity Conference (EIC) is Europe's leading event for Identity and Access Management (IAM) and Governance, Risk Management, and Compliance (GRC), and cloud security. For the 11th time, the EIC offered us best practices and discussions with more than 700 participants from worldwide
In our previous entry, we talked about how General Data Protection Regulation, or “GDPR”, enables EU citizens to control their data profiles, or “digital footprint”. In essence, the many rights provided by the GDPR means that the subject (the citizen) becomes the owner of any data
The General Data Protection Plan, known by GDPR, is new legislation that defines data protection standards and laws across the European Union. This regulation effectively repeals the Directive 95/46/EC. Consistency is the goal for the GDPR; the legislation imposes a uniform security data law