regulation

Is it Unlawful to Collect or Store TCP/IP Log Data for Security Purposes?

It is a common and accepted practice for entities to collect, store, process and analyze log data. This log data…

2 years ago

Tech Companies Cool Toward California Consumer Privacy Act

There’s a saying, “As California goes, so goes the nation.” And for good reason: It seems many of the laws…

2 years ago

Does your security solution protect against GDPR non-compliance?

Despite a seemingly complete overhaul of data security and privacy as the General Data Protection Regulation rolled out, many fall…

2 years ago

Data Privacy: Five Ways to Ensure You Comply with GDPR

  Data Privacy: Five Ways to Ensure You Comply with GDPR Because, the times, they are a’ changin’ for data…

3 years ago

CA Technologies’ Yann Guernion Talks GDPR and Automation

As of this writing, we are now less than one month away from the implementation of the General Data Protection…

3 years ago

Will Data Regulation Help Stop Data Breaches?

With the recent headline-making breaches such as Lord & Taylor and Panera, U.S. consumer sentiment is quickly shifting.  Accordingly to…

3 years ago

GDPR Countdown Checklist: 3 Strategic To-Do’s for Cybersecurity Teams

Over the past two years, many IT security teams began working closely with their business unit colleagues on implementing new…

3 years ago

How Digital Payment Systems Like PayPal Are Used for Money Laundering | Part 3

Covert data collection found that PayPal and other digital payment systems are employed by cybercriminals to launder money Digital payment…

3 years ago

Laundering Via In-Game Currency and Goods is on the Rise | Part 2

In-game purchases and currencies are spurring a rise in gaming-related laundering Minecraft, FIFA, World of Warcraft and more are used…

3 years ago

Cybercriminals Use Bitcoin as One Method of Laundering Money | Part 1

We are following the money to see what happens to the proceeds from cybercrime. This research shows cybercriminals are money…

3 years ago