Wednesday, November 20, 2019

Microsoft to offer CCPA data privacy protections across entire U.S.

 
Security Digest
Information security news and advice from TechTarget's network |November 20, 2019
TechTarget
FEATURED STORY
Microsoft to apply CCPA protections to all US customers

by Alexander Culafi, News Writer

and Rob Wright, News Director

Microsoft said it will apply the California Consumer Privacy Act across the nation and extend the law's data privacy protections to customers in all 50 states.

Advertisement
NEWS
 
ZombieLoad v2 disclosed, affects newest Intel chips

Researchers disclosed another variant of the ZombieLoad side-channel attack that affects the newest Intel processors, and also discovered a flaw in the original ZombieLoad patch.

 
Check Point: Qualcomm TrustZone flaws could be 'game over'
Researchers discovered vulnerabilities in Qualcomm TrustZone that Check Point says could lead to 'unprecedented access' because of the extremely sensitive data stored in mobile secure elements.
 
InfoTrax settles FTC complaint, will implement infosec program

InfoTrax settled an FTC complaint over an extensive data breach that lasted two years. Now, it can no longer collect any personal data until it implements its own infosec program.

 
Anti-stalkerware coalition calls time on intrusive abusers
A new coalition of security suppliers and advocacy groups plans to tackle the scourge of stalkerware as a tool of domestic and other forms of abuse.
EXPERT ADVICE
 
Build new and old strategies into insider threat management

The risk of insider threat does not discriminate across industry lines. Learn how to build an insider threat management program that combines AI, zero-trust principles and a healthy security culture.

 
Benefits of using Azure Security Center for security assessments

Author Yuri Diogenes discusses how Azure Security Center helps admins achieve full cloud visibility, conduct security assessments and prevent potential breaches.

 
Biometric data privacy, ethical questions complicate modern IAM

Use of biometrics in IAM systems may help secure company systems and data, but it also raises privacy issues. Here's how to keep both your security and ethical standards high.

 
The identity and access management compliance conundrum

Desperately seeking secure IAM? You're not alone, and it gets extra tricky when biometrics are involved. Learn to employ modes of modern identity management and still stay compliant.

 
Use network traffic analysis to detect next-gen threats

Network traffic analysis, network detection and response -- whichever term you prefer, the technology is critical to detecting new breeds of low-and-slow threats.

 
Use Azure Security Center to conduct a security posture assessment
In this excerpt from Chapter 4 of 'Microsoft Azure Security Center,' the authors outline how to use the software to determine and improve your enterprise's cloud security posture.
 
IAM-driven biometrics in security requires adjustments

IAM is foundational to cybersecurity, but the latest systems use biometrics and other personal data. Learn how to cope with the resulting compliance and privacy issues.

 
The benefits of IAM can far outweigh the costs

Identity and access management is a critical piece of enterprise information security. But the benefits of IAM go beyond illuminating who -- and what -- might be using your network.

About This E-Newsletter
The Security Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: