How will CCPA change business landscape

How will CCPA change the business landscape?

What is California Consumer Privacy Act (CCPA) California Consumer Privacy Act (CCPA) is a privacy act which becomes effective at the beginning of 2020. The act aims to help California residents to regain control over their personal data, giving them the rights to: Know what data a business collected on them Right to object to Read more about How will CCPA change the business landscape?[…]

HIPAA IT Compliance | Main Things You Need to Know

HIPAA IT Compliance Guide: Main Things You Need to Consider

What is HIPAA HIPAA stands for Health Insurance Portability and Accountability Act. HIPAA provides data privacy and security measures for safeguarding medical information such as biometric data, patient health history, etc. It was signed into law in the year 1996, by President Bill Clinton. The act contains five titles covering: Prevention of group health plans Read more about HIPAA IT Compliance Guide: Main Things You Need to Consider[…]

Acronis Conference IT Security

Best Practices of Developing Secure Software (Acronis Cyber Protection Conference)

A Cyber Protection Developers Conference organized by Acronis was held yesterday at the Sofia University (Bulgaria). Driven by the rising need of increasing cybersecurity and data protection measures, Acronis dedicated the conference to resolving issues such as improving the overall security of products and unlocking IT potential. How to unlock the IT potention of Bulgaria? Read more about Best Practices of Developing Secure Software (Acronis Cyber Protection Conference)[…]

Privacy by Design in practice

Privacy by Design in Practice

The past year saw the acceleration of two already important information security trends: the ever-increasing threat of data breaches  a rising consumer and regulatory oversight on corporate data processing. Indeed, the year was not a good one for privacy – high profile data breaches range from the Marriott Hotels (500 million people), through marketing firm’s Read more about Privacy by Design in Practice[…]

Reasons not to ignore data integrity

3 Reasons Not To Ignore Data Integrity

Data integrity, or the certainty that data has not been modified, is important in many cases – from communication protocols, through low-level data storage systems, to business-critical databases. Due to our reliance on the data we have, we need to guarantee it hasn’t been tampered with before we use it to take any decision. Unfortunately, Read more about 3 Reasons Not To Ignore Data Integrity[…]

Comparison_log_aggregation_tools

Comparison: LogSentinel vs Splunk vs Loggly, etc.

Logs – every system has them, but companies don’t usually pay much attention to them. At least not until a problem occurs. Log aggregation solutions come handy in many scenarios – tracing production issues, alerting on service degradation, fixing bugs, forensics, fraud detection. We’ve argued, however, that logs have a dual nature – on the Read more about Comparison: LogSentinel vs Splunk vs Loggly, etc.[…]

fraud-detection

Fraud Detection: Approaches and Pitfalls

With the explosive growth of data businesses now can have a look at the very minutae of their processes. This includes details on which user took what action in which system, ranging from mission critical payments and asset transactions to the ultimately mundane users’ login in their own computers. On the one hand this trove Read more about Fraud Detection: Approaches and Pitfalls[…]

cyber-security-tips

11 Cyber Security Tips to Achieve GDPR Compliance

Organizations, especially those collecting and using personal data, must take the necessary measures to ensure the confidentiality, integrity and security of the data, therefore to be GDPR compliant as stated in Article 5. This objective could be achieved only by following the best practices in protecting and maintaining the IT systems. Below are some cyber Read more about 11 Cyber Security Tips to Achieve GDPR Compliance[…]

PSD2 directive

The Payment Services Directive (PSD2) and its Logging Requirements

The Payment Services Directive (Directive (EU) 2015/2366, PSD2) has been hailed as a game-changer that will transform the payment services landscape in Europe. While this outspoken enthusiasm reflects the deep changes it will bring, it sometimes fails to note that the increased freedom and elimination of market entry barriers is carefully counterbalanced with a robust Read more about The Payment Services Directive (PSD2) and its Logging Requirements[…]

Fortnite_EpicGames_2FA

Epic Games Turning on 2FA – The Rise of The InfoSec Awareness

Crunchbase announced that Epic Games have implemented a 2FA in a very innovative way – Fortnite players can unlock a new emote by enabling a two-factor authentication. Raising information security awareness across the youngest Internet audience is a challenging journey and it seems that Epic Games are accepting the challenge! Over 125  million users actively Read more about Epic Games Turning on 2FA – The Rise of The InfoSec Awareness[…]