CISO Mitchell Parker of Indiana University Health says healthcare organizations that have focused on HIPAA compliance when crafting security and privacy policies need to be making plans to comply with the EU's GDPR if they handle Europeans' data. How will that influence decisions about data protection?
The latest ISMG Security Report features highlights from the recent panel discussion at the ISMG Fraud and Breach Prevention Summit in London on preparation for the European Union's General Data Protection Regulation set to be enforced next May.
Can U.S. law enforcement use a warrant to seize emails stored outside the U.S. by a cloud services provider? That's the question the Supreme Court has agreed to consider next year. Microsoft continues to fight an order to turn over emails stored in an Irish data center.
A discussion with ISMG Security and Technology Editor Jeremy Kirk about his chat with the cyber gang "The Dark Overlord," which threatened some U.S. school districts with extortion, leads the latest edition of the ISMG Security Report. Also, an update on surging IT security employment.
With the General Data Protection Regulation (GDPR) coming into effect on May 25, 2018, any organization handling EU residents' personal data should be prepared to comply with stricter privacy regulations or be ready to pay fines up to four percent of their global annual revenue. This is a substantial penalty for...
Through an ongoing series of Healthcare Security Readiness workshops, key gaps in how healthcare organizations defend against cybercrime hacking have emerged. Has your organization assessed and mitigated gaps in security...or are even aware of what they are?
In the following ISMG interview transcript, David...
An ongoing series of Healthcare Security Readiness workshops reveals some key gaps in how healthcare organizations defend against cybercrime hacking. How should entities assess and mitigate these gaps? David Houlding of Intel shares insights.
CISOs have plenty to keep them up at night. With data breaches, ransomware incidents and system compromises, security leaders are forced to find ways to beat threats without slowing their pace of business. If they fail to effectively manage those risks, their organizations can face huge consequences.
With less than a year to go before enforcement of the EU's General Data Protection Regulation, or GDPR, which applies to any organization that handles Europeans' data, many larger organizations affected in India have yet to make much headway in appointing a data protection officer as required by the law.
Srinivas Poosarla, Infosys's data privacy chief, discusses the impact of the European Union's General Data Protection Regulation, or GDPR, on Indian companies and the steps that security practitioners need to take to comply.
Organisations of every size are experiencing a problem as their operations digitally transform. They are unable to secure mission-critical workloads on cloud-based infrastructure without increasing risk, operational friction, or introducing compliance violations.
However, creating simpler and faster user-based...
Companies in all sectors are faced with substantial challenges to prepare for GDPR. Regulators and supervisory authorities in charge of data protection wield a number of hefty sticks with which to enforce the new regime under GDPR.
To help your organisation prepare, download this whitepaper and learn:
If GDPR is...
The European Parliament and European Commission are pushing for mandatory end-to-end encrypted communications, and banning backdoors, as part of the EU's rebooted e-privacy regulation. But the move runs counter to anti-crypto rhetoric being spouted by government ministers in Britain and France.
GDPR is in effect, and in one year, regulators will start to assess penalties against enterprises not in conformance with the regulation. How prepared are entities? Will it take a high-profile penalty to get the world's attention? Michael Hack of Ipswitch weighs in.
Infosecurity Europe 2017 in London drew an estimated 18,000 attendees. Here are 13 visual highlights from the annual information security conference, ranging from tchotchkes and keynotes to 19th century architecture and live hacks of internet-connected devices.