Data Privacy

Read: i-PRO Shares Tips With Security Pros for International Data Privacy Day

i-PRO Shares Tips With Security Pros for International Data Privacy Day

Among the insights: privacy-by-design, encryption, masking and finding the right balance between data privacy and effectiveness.

Read: Genetec Shares Best Practices for International Data Privacy Day

Genetec Shares Best Practices for International Data Privacy Day

Genetec encourages businesses and individuals to use International Data Privacy Day as an opportunity to enhance their data protection.

Read: ASEL and Pimloc Announce Strategic Partnership

ASEL and Pimloc Announce Strategic Partnership

Pimloc’s partnership with Argenbright Europe Limited (AESL) provides AESL’s customers with access to Pimloc’s Secure Redact technologies, which can now be integrated into AESL’s suite of services to blur personal and sensitive data.

Read: SIA Publishes Privacy Code of Conduct; Will Host Lunch ‘n’ Learn

SIA Publishes Privacy Code of Conduct; Will Host Lunch ‘n’ Learn

The publication is said to be designed to help security technology companies enhance their management of personal information.

Read: Microsoft to Comply With California’s Privacy Law Nationwide

Microsoft to Comply With California’s Privacy Law Nationwide

The CCPA — somewhat similar to the European Union’s GDPR — is one of the most sweeping data privacy regulations in the U.S.

Read: GDPR Impact on Security Ecosystem to Be Examined in ISC West Session

GDPR Impact on Security Ecosystem to Be Examined in ISC West Session

The General Data Protection Regulation will affect organizations in the European Union, but the data privacy law can also have far-reaching impact on North American-based systems integrators, monitoring firms and manufacturers.

Read: Keep Your Video Data Secure

Keep Your Video Data Secure

Securing the edge of your video surveillance network.

Read: ‘Threat Intellect’ Service Examines Billions of Network Security Events in Minutes, AT&T Says

‘Threat Intellect’ Service Examines Billions of Network Security Events in Minutes, AT&T Says

The technology helps to identify abnormal and malicious activity based on data patterns.

Read: Ensuring Data Security in a Hyper-Connected World

Ensuring Data Security in a Hyper-Connected World

Bosch takes a four-step approach to maximize data security.

Read: Report: U.S. Govt. Ranks Last Among Major Industries on Cybersecurity

Report: U.S. Govt. Ranks Last Among Major Industries on Cybersecurity

Education, telecommunications and pharmaceutical industries also ranked low on cybersecurity.

1 2 3
Get Our Newsletters