Online privacy is complex, encompassing debates over law enforcement’s data access, government regulation and what information companies can collect. This chapter examines Americans’ perspectives on ...
The personal data that companies collect from consumers online has become a big business referred to as data brokerage. However, most consumers don't know what personal information about them is being ...
SB 4 outlines regulations for data brokers, defined as a 'business that sells or licenses brokered personal data to another ...
If you get a call from John Eakins at the Delaware Attorney General's office, you've already filed a data breach notice with the state, so you know there's a problem. What information security teams ...
Data privacy regulation continued to accelerate in 2025, with both U.S. regulators and international authorities placing increased emphasis on enforcement and operational compliance. For organizations ...
As the demand for AI surges, AI vendors are devoting greater bandwidth to data security issues. Not only are they being compelled to comply with emerging data privacy regulations (e.g., the EU Data ...
The convergence of rapidly growing cyberattacks and increasingly strict data privacy regulations has companies stuck between a rock and a hard place. On one hand, enterprise data is being targeted by ...
This is a guest post by Anurag Varshney, product marketing manager for Baltimore County data privacy services company Ardent Privacy. Technical.ly is a media partner ...
As AI continues to transform industries, the conversation around AI regulation has intensified. However, one crucial aspect often overlooked in these discussions is the foundational role of data ...
Think of three marketing channels. Got them in mind? We’re willing to bet you didn’t picture newspapers, radio, or flyers. That’s because the vast majority of marketing these days is digital (social ...
Kris Lahiri is Co-founder and Chief Security Officer at Egnyte, responsible for the company's security, compliance and core infrastructure. In the rapidly evolving landscape of cybersecurity, ...