article thumbnail

MY TAKE: The no. 1 reason ransomware attacks persist: companies overlook ‘unstructured data’

The Last Watchdog

All too many companies lack a full appreciation of how vital it has become to proactively manage and keep secure “unstructured data.”. One reason for the enduring waves of ransomware is that unstructured data is easy for hackers to locate and simple for them to encrypt. A few takeaways: Outside a database.

article thumbnail

Unstructured Data and What it Means for GDPR Compliance

Security Boulevard

Back on May 25, 2018, the European Union’s General Data Protection Regulation (GDPR) came into effect, meaning all organizations that offer goods or services to European Union residents, or collect consumer data within the region, are now required to comply with the regulation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: How stricter data privacy laws have redefined the ‘filing’ of our personal data

The Last Watchdog

Legacy filing systems were not built to keep track of the personal data of specific individuals primarily to be in compliance with the many data protection regulations popping up around the world. Since it took effect in 2018, GDPR’s core guidelines have been copied by LGDP in Brazil , POPIA in South Africa , and the PDPB in India.

article thumbnail

RSAC insights: Concentric AI directs Google’s search techniques towards locking down data sprawl

The Last Watchdog

Much of the buzz as RSA Conference 2022 gets underway next week in San Francisco will be around innovations to help companies make sense of data as it gets increasingly dispersed to far-flung pockets of the public cloud. I had the chance to visit with Karthik Krishnan, CEO of San Jose, Calif.-based

article thumbnail

Anomali ThreatStream: Threat Intelligence Product Overview and Insight

eSecurity Planet

Anomali’s series D funding raised $40 million in 2018, raising the total funding to more than $96.3 Applicable Metrics ThreatStream consumes both structured and unstructured data from hundreds of threat intelligence feeds, processing millions of Indicators of Compromise (IOCs). million since launch.

article thumbnail

China Personal Information Protection Law (PIPL): A New Take on GDPR?

McAfee

Many people have heard of the GDPR (General Data Protection Regulation), legislation that became law across the EU in May 2018. It was designed to regulate how businesses protect personal data, notably how personal data is processed, and granted rights to individuals to exercise more control over their personal data.

article thumbnail

How to Prepare for the Future of Healthcare Digital Security

Thales Cloud Protection & Licensing

In an effort to meet compliance requirements – and with an eye towards cutting costs – the healthcare industry has turned its attention towards embracing digitally transformative technologies, including cloud, big data, Internet of Things and containers. respondents reported using these technologies with sensitive data.