It is a common and accepted practice for entities to collect, store, process and analyze log data. This log data…
There’s a saying, “As California goes, so goes the nation.” And for good reason: It seems many of the laws…
Despite a seemingly complete overhaul of data security and privacy as the General Data Protection Regulation rolled out, many fall…
Data Privacy: Five Ways to Ensure You Comply with GDPR Because, the times, they are a’ changin’ for data…
As of this writing, we are now less than one month away from the implementation of the General Data Protection…
With the recent headline-making breaches such as Lord & Taylor and Panera, U.S. consumer sentiment is quickly shifting. Accordingly to…
Over the past two years, many IT security teams began working closely with their business unit colleagues on implementing new…
Covert data collection found that PayPal and other digital payment systems are employed by cybercriminals to launder money Digital payment…
In-game purchases and currencies are spurring a rise in gaming-related laundering Minecraft, FIFA, World of Warcraft and more are used…
We are following the money to see what happens to the proceeds from cybercrime. This research shows cybercriminals are money…