Remove Authentication Remove Consumer Protection Remove Data privacy
article thumbnail

Data Privacy Week 2023: Privacy Gains Power From Other Societal Forces

Security Boulevard

Privacy was a major topic of conversation in 2022 — beyond just keeping personal data out of the hands of cybercriminals. Privacy now ties into many adjacent areas, including Zero Trust security, antitrust concerns, usage of services provided by "Big Tech," and biometric authentication. What's Next?

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

Using Luna HSMs to secure 5G VNFs, protect PKI-based infrastructure, subscriber authentication, identity and privacy can also help Telcos meet industry compliance and government regulatory mandates for data privacy and consumer protection.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Turning Aspiration into Action to Protect Financial Institutions

Thales Cloud Protection & Licensing

Security professionals know adequate security requires encryption, tokenization, authentication, and access management, so why are their good intentions too often sidelined? Here’s a look at four common issues highlighted in the 2019 Thales Data Threat Report-Financial Services Edition and tips for overcoming them. Compliance v.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

“I would say that you’re talking about state data breach laws, state and federal laws against unfair and deceptive trade practices, [and] potentially HIPAA liability for health institutions that were relying on a system that was using inadequate security protocols,” Davisson continued. “If This is a design failure,” agreed Kulkarni. “It

article thumbnail

Utah Consumer Privacy Act (UCPA) 

Centraleyes

What is the Utah Consumer Privacy Act? The Utah Consumer Privacy Act, or UCPA , is a state-level data privacy law enacted in Utah, USA, aimed at providing residents with greater control over their personal data. How is compliance achieved?

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Security Boulevard

Using Luna HSMs to secure 5G VNFs, protect PKI-based infrastructure, subscriber authentication, identity and privacy can also help Telcos meet industry compliance and government regulatory mandates for data privacy and consumer protection.

article thumbnail

Holiday Shopping Readiness: How is Retail Data Security Holding Up?

Thales Cloud Protection & Licensing

Vendors’ attention is increasingly fragmented across various data-collecting and transactional platforms. As if things were not difficult enough, data collection in more states and countries is becoming stricter, with increased consumer protection laws leaving retailers applying tighter data privacy to their digital platforms.

Retail 71