California adds biometric specs to data breach law

California adds biometric specs to data breach law

California is changing its Information Practices Act of 1977 to expand the definition of personal information with additional identifiers, including biometric data of those affected. The amendment comes with new instructions on ...
behavioral biometrics

Make Digital ID Verification Part of Your CCPA Strategy

As CCPA is poised to take effect, companies must ensure they don’t put personal information in the wrong hands The lines between the digital and physical world are continuing to blur and ...
Security Boulevard
Al Gore on creating the internet

Your Personally Identifiable Information Is Part of You: Stop Giving It Away

Are hackers really the problem when governments can just ask for or legislate the requirement to turn over user data? Russia currently has approximately 149 million people living in within its borders, ...
digital security small business owners FI

Think Your Business Is Too Small to Get Hacked? Wake Up!

Sixty percent of small- to mid-sized businesses (SMBs) go bankrupt six months after suffering a cyberattack. The risk is simply too great. SMBs need to strengthen their digital security. Uber…Equifax…Yahoo…if you look ...
Cyberattacks Lurking in Every Data Store

It’s Beginning to Look a Lot Like Christmas, with Cyberattacks Lurking in Every Data Store

Based on the holiday song, “It’s Beginning to Look a Lot Like Christmas,” by Meredith Willson It’s beginning to look a lot like Christmas Everywhere you go Take a look at emails ...
Security Boulevard
database security

Dark Patterns: Stealth Ways Companies Collect Personal Data

Security experts and security writers talk a lot about how sophisticated cybercriminals are at getting the information they want. But what we don’t talk enough about is how well legitimate companies are ...
Security Boulevard
HR data

Data Security Spotlight: Protecting Electoral (and Everyday) Data

Intelligence is key to data security in an age where data breaches have gone mainstream Did you vote on Tuesday? Or, were you part of the ​​“nearly one in five Americans” who ...
Security Boulevard
Security Automation

Overcoming the Shadow IT Catch-22

Trying to prevent shadow IT from sweeping through your organization is like trying to protect your sand castle from the waves when high tide rolls in—it can’t be done. Employees expect to ...
Security Boulevard
The Internet of Things (IoT) and digitally stored PII: Avoidable or Inevitable? 

The Internet of Things (IoT) and Digitally Stored PII: Avoidable or Inevitable? 

The Internet of Things (IoT) is rapidly showing up in all facets of daily life and collecting personally identifiable information (PII) in massive quantities. From smart home thermostats to one-click purchasing, IoT devices ...