Remove Consumer Protection Remove Cyber threats Remove Data privacy
article thumbnail

Holiday Shopping Readiness: How is Retail Data Security Holding Up?

Thales Cloud Protection & Licensing

Vendors’ attention is increasingly fragmented across various data-collecting and transactional platforms. As if things were not difficult enough, data collection in more states and countries is becoming stricter, with increased consumer protection laws leaving retailers applying tighter data privacy to their digital platforms.

Retail 71
article thumbnail

Holiday Shopping Readiness: How is Retail Data Security Holding Up?

Security Boulevard

Vendors’ attention is increasingly fragmented across various data-collecting and transactional platforms. As if things were not difficult enough, data collection in more states and countries is becoming stricter, with increased consumer protection laws leaving retailers applying tighter data privacy to their digital platforms.

Retail 64
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2025 Cybersecurity Predictions: Not Getting Easier; But There is Hope

SecureWorld News

Other buzz words and topics that are top of mind: Quantum computing; NIST standards; a patchwork of data privacy legislation and standards with hope for more consistency; foreign adversaries ramp up their efforts and the U.S. Ideologically driven cyberattacks from conflicts like in Ukraine and Gaza will also spur further threats. "As

article thumbnail

Top 6 Compliance Management Tools for Financial Services

Centraleyes

Over the last decade, financial firms have been mandated to adopt new compliance frameworks at an unprecedented rate, partly due to the sector’s digital transformation and rising concerns around cybersecurity and consumer protection.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

Research by e2e-assure reveals a significant gap between perception and reality; while 85% of cyber risk owners express confidence in their AI policies, only 34% of employees are even aware such guidance exists. Cyber threats often exploit human errors, whether through phishing attacks, weak passwords, or lapses in protocol.