The following is a guest post by Hugo Loriot, partner at data company fifty-five. Opinions are the author’s own. In late June, the Energy and Commerce Committee ...
To safeguard enterprise data in hybrid cloud environments, organizations need to apply basic data security techniques such as encryption, data-loss prevention (DLP), secure web gateways (SWGs), and ...
With cyber security and data protection being two sides of the same coin, it is no longer tenable for organisations to take a siloed approach to protecting data from cyber threats, according to backup ...
A common theme amongst my writing and presentations lately has been that data protection is impossible. Think about it. The whole concept of protecting data from being stolen, lost, or inappropriately ...
India’s privacy and data protection regime are no longer distant ambitions or empty policy conversations. With the enactment ...
Over the past decade, reforms around data regulation have re-enforced the message around data security and the need for robust security measures. These reforms are essential, considering how data ...
In May 2023, Meta was fined a record-breaking 1.2 billion euros ($1.3 billion) by the Irish Data Protection Commission (DPC) for breaching the General Data Protection Regulation (GDPR). The DPC ruled ...
The 21st century has ushered in an era of unprecedented digitalization, transforming how personal and professional information is created, shared, and stored. Data protection refers to the practices, ...
Congress has repeatedly failed to pass comprehensive national data protection legislation, and the states are rapidly filling the void with laws that impose different requirements on a state-by-state ...
Maryland’s new data protection law, the Maryland Online Data Privacy Act (MODPA), takes effect October 1, 2025, and introduces stricter requirements for processing ...
We recently looked at how backup can be a key component to help organisations protect against ransomware attacks. But we also discussed the idea that all backup systems need to be audited to ensure ...