Wrangu – GDPR Cause or Effect?

Many whitepapers have been written about the “Ripple effect” of the General Data Protection Regulation (GDPR), and the effect this EU regulation has had on global data protection laws. The key question to ask is the “How” and “Why” the GDPR has had an effect on global data protection laws. To read the full whitepaper, […]

The Data Privacy Group – Building an Effective Privacy Program

Achieving compliance with data privacy regulations is becoming increasingly challenging for businesses in today’s rapidly evolving privacy landscape. The proliferation of commercial websites, marketing platforms and consumer services has spawned massive volumes of personal data that are being collected, processed and shared. Until recently, it was generally thought that global privacy compliance was an issue […]

Actifio – Cyber Resiliency

Cyber security has long been an integral IT priority governing the methods, processes, and tactics used to protect data and systems. It means implementing the technology and best practices needed to prevent unauthorized data access. Now, Cyber resiliency has joined the concept of cyber security as a growing enterprise imperative. Cyber resiliency extends abilities that […]

OneTrust DataGuidance: Comparing privacy laws: GDPR v. CCPA

The General Data Protection Regulation (Regulation (EU) 2016/679) (‘GDPR’) and the California Consumer Privacy Act of 2018 (‘CCPA’) (SB-1121 as amended at the time of this publication) both aim to guarantee strong protection for individuals regarding their personal data and apply to businesses that collect, use, or share consumer data, whether the information was obtained […]

ClearComm – Five Steps Towards Managing Cyber Risk

Our economy, society and individual lives have been transformed by digital technologies. They have enabled improvements in science, logistics, finance, communications and a whole range of other essential activities. As a consequence of this, we have come to depend on digital solutions, and this leads to very high expectations of how reliable and trustworthy these […]

Luminati – The Rising Use of Residential Proxies for Open-Source Data Collection

Digital online suppliers and most enterprises need new market intelligence techniques to avoid the automatic and targeted barriers many websites set up to limit collection of publicly available data being presented on their websites. Proxies of various sorts are vital for discovering their competitors’ product availability and pricing, checking that adverts are being displayed correctly […]

Nymity – From Privacy Project to Privacy Program

The GDPR came into effect on May 25, 2018. Leading up to this date, many organisations had determined that it would be practical to approach the many requirements of the GDPR as a “project” with various workstreams. To that end, project managers were engaged to assist with the compliance obligations, timelines and milestones in line […]

Trustarc – Measuring Privacy Operations 2019

Cookies, Local vs. Global Compliance, DSARs and more. In Measuring Privacy Operations 2019, the IAPP and TrustArc offer privacy professionals around the globe a look at how their colleagues are implementing privacy requirements. This is the latest in a series of reports designed to help companies benchmark their own privacy practices against those of their […]

WhiteSource Software – The Complete Guide on Open Source Security

Open source components are the core building blocks of application software, providing developers with a wealth of off-the-shelf possibilities that they can use for assembling their products faster and more efficiently. Open source components, the libraries and frameworks which are written and maintained by the open source community, account for 60-80% of the code base […]