(For model data security contract clauses for use in a CSP agreement, with explanatory notes and drafting and negotiating tips, see Data Security Contract Clauses for Service Provider Arrangements ...
Collects and uses customer or employee personal information. Participates in an industry sector that is considered high risk or critical infrastructure. Offers securities as a publicly traded company.
The Berkman Klein Center is pleased to announce a new publication from the Privacy Tools project, authored by a multidisciplinary group of project collaborators from ...
Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with content, and download exclusive resources. Dany Lepage discusses the architectural ...
Expectations related to risk are rising across the board—from regulators to third parties to management’s desire to help drive risk management through risk assessment programs. As a result, today’s ...
[Excerpted from "A Guide to Practical Database Monitoring," a new, free report posted this week on Dark Reading's Database Security Tech Center.] Database activity monitoring, a form of application ...
A few years ago, mentioning homomorphic encryption (HE) among colleagues in the security space, much less in a business context, would either elicit blank stares or a sigh, followed by a hopeful "if ...