Posted on 03 October 2017 by Thales DIS
The Australian government has been working to update their Privacy Act of 1988 with the Privacy Amendment (Notifiable Data Breaches) Act of 2017. That sounds like a lot of legislative jargon, but the Amendment is very important for people whose responsibility it is to protect data in Australia. Data breaches hit the news in a […]
Posted on 05 October 2017 by Jennifer Dean
With the Defense Federal Acquisition Regulation Supplement compliance deadline approaching, businesses are scrambling to meet compliance requirements. DFARS addresses the need for strong, two-factor authentication and physical access controls. Are you ready for DFARS?
Posted on 12 October 2017 by Thales DIS
The GDPR new data security standard aligns member state legislation across the EU. This goes for citizens, visitors, immigrants as well as for any company that retain EU customer data – whether they reside and process data within the Union or not. Are you GDPR compliant?
Posted on 10 July 2018 by Thales DIS
On May 25, the European Union’s General Data Protection Regulation (GDPR) went into effect. This long-awaited deadline ushered in a new age where confidence of data protection measures is more critical than ever. Organizations could incur reputational damage and a hefty fine, for example, if their lack of confidence coincides with GDPR noncompliance. With GDPR […]
Posted on 08 August 2018 by Thales DIS
Financial Services companies operating in the State of New York have until September 3, 2018 to be in compliance with the new mandates of the New York State Cybersecurity Requirements for Financial Services Companies, known as 23 NYCRR Part 500. While there are several new requirements in this latest round of rolling compliance deadlines, the […]
Posted on 19 September 2018 by Sek Leong
Like to comply with the Notifiable Data Breaches (NDB) Scheme? If you plan on attending the 2018 AISA Cyber Conference please stop by the Gemalto Stand (77) and meet the Gemalto team. Our cyber security experts will discuss how to develop an access management strategy that includes multi-factor authentication to protect your organization from identity theft.