Posted on 06 June 2019 by
On May 25, the European Union celebrated the first anniversary of the enforcement of the General Data Protection Regulation (GDPR), the most important change in data privacy regulations in the last decade, designed to restructure the way in which personal data is handled across every sector (public or private) and every industry. Now that one year has passed since the GDPR came into effect, we’ve had a lot of questions arising.
Posted on 04 June 2019 by
As the EU embarked on a new relationship with the GDPR (General Data Protection Regulation) Council, new regulations were firmly implemented on May 25th, 2018. Companies across Europe had to find new ways of working while better managing their data privacy. Read more about finding harmony between GDPR and the Cloud now one year later since GDPR’s implementation.
Posted on 23 May 2019 by
It’s been one year since the European Union (EU) enforced the General Data Protection Regulation (GDPR), legislation designed to protect the personal data of EU citizens and lay specific rules and guidelines on how their data is collected, stored, processed and deleted by various entities. During this year, a number of European DPAs have confirmed that the new regulation has led to a significant rise in reported data breaches, clearly demonstrating the impact GDPR has had on raising awareness with the general public as well as organizations regarding their rights and obligations under EU data protection law.
Posted on 14 May 2019 by
Thales’ SafeNet Data Protection on Demand and SafeNet Trusted Access solutions have won the gold award in the Encryption and Identity and Access Management categories of the 2019 Cybersecurity Excellence Awards.
Posted on 13 May 2019 by
Business organisations today are handling massive volumes of data at various levels in their operation. With digitization being implemented on a huge scale, data breach is now among the primary concerns that business entities are either facing or fearing. In this blog post, we will touch upon data masking – one of the most popular ways to secure sensitive data.
Posted on 15 April 2019 by
In the first part of this two-part series on Key Management, we saw how an increasing number of organizations are encrypting their sensitive data to mitigate cybersecurity risks. As covered earlier, with cybercriminals getting more sophisticated, merely encrypting data is not sufficient.