Securiti AI Launches Context-Aware LLM Firewalls to Secure GenAI Applications

View

Sitemap

Blogs

  1. How Unstructured Data Governance Can Prevent Costly Mishaps in GenAI
  2. Combine Consent and Customer 360 with Securiti + Snowflake
  3. Command Your Data with Securiti and Snowflake Horizon
  4. Unstructured Data, GenAI, and Regulatory Compliance
  5. The Role of Unstructured Data in GenAI: From Key Driver to Top Challenge
  6. Australia Moves Closer to GDPR-Like Privacy Laws – Challenges for Australian Businesses
  7. PIA and DPIA: What’s the Difference Between Both?
  8. Your DSPM Checklist: 9 Key Tenets for a Next-Generation Data Command Center
  9. Why DSPM? Top 6 Cloud Data Security Challenges Solved
  10. US Treasury Examines AI-Related Security Risk in FinServ: What You Need to Know
  11. 5 Steps to AI Governance: From Shadow AI to Strategic Oversight
  12. Inside the EU AI Act, the World’s First Comprehensive AI Law
  13. Responsible AI: The Path to Increased Business Value
  14. Beyond Data Cataloging: Unlocking Secure Data Sharing with Sensitive Data Intelligence and Granular Access Controls
  15. Safe and Responsible AI in Australia – The Government’s Interim Response
  16. A CDO’s Guide to Unstructured Data in the Generative AI Era
  17. The Dangers of Uncontrolled AI: Shadow AI and Ethical Risks
  18. Top 7 Benefits | How Enterprises Gain from Securiti-Databricks Collaboration
  19. AI TRiSM |Navigating the Maze of Data+AI Security with Confidence
  20. Securiti Is Now An Official Google-Certified Consent Management Platform
  21. Securing Your Crown Jewels With Data Security Posture Management (DSPM)
  22. Unleash the Power of Data with Access Controls
  23. Databricks and Securiti Forge a Path for Unified and Secure Data Management
  24. CPRA Cookie Consent – All You Need To Know [2024 Guide]
  25. Why I joined Securiti?
  26. Charting The Future: White House Rolls Out a Landmark AI Executive Order
  27. LGPD & Cookies: What Do You Need To Know?
  28. Compliance Checklist for China’s PIPL
  29. Employer Obligations on Employee Data Under Indian Law
  30. Securiti named a Leader in the IDC MarketScape for Data Privacy Compliance Software
  31. What is RoPA? Records of Processing Activities Explained
  32. ITAR vs. EAR Compliance – What’s the Difference
  33. ITAR and Encryption | What You Need to Know
  34. Securiti Wins SC Magazine Award for “Best Regulatory Compliance Solution”
  35. Behind the Headlines: Understanding The FTC’s Microsoft Case
  36. Opt In vs Opt Out Consent: What’s the Difference?
  37. What is Sensitive Data Exposure Vulnerability & How to Avoid It?
  38. The HR Guide to Employee Data Protection
  39. Improve Data Understanding, Accessibility, & Control With an Automated Data Catalog
  40. Everything You Need to Know About Third-Party Cookies
  41. What are Advertising Cookies and How are they used?
  42. Everything You Need to Know About Session Cookies
  43. Email Marketing Requirements under GDPR and e-Privacy Directive
  44. China’s Interim Measures on Generative AI: The Basics to Know
  45. Exploring the FTC’s Enforcement Action for Violation of & Amendments to the Health Breach Notification Rule (HBNR)
  46. Japan’s Instructions For Generative AI Services
  47. ITAR Compliance Checklist: 8 Steps to Comply with ITAR
  48. An Overview of Connecticut SB 1103 | An Act Concerning Artificial Intelligence, Automated Decision-Making and Personal Data Privacy
  49. What EdTech Companies Can Learn From FTC’s Recent Enforcement Action
  50. What are the Different Types of Consent?
  51. Fines & Penalties for Non-Compliance with the CCPA
  52. What is Proof of Consent under GDPR?
  53. A Breathing Room for Businesses | Court Decision Postpones CPRA Enforcement Until March 2024
  54. How to Manage DSARs Under CCPA Efficiently and Effectively
  55. 6 Keys to Automating the DSAR Process Under CCPA
  56. New Dubai Data Protection Law
  57. CCPA Cookie Consent: What Do You Need To Know?
  58. 8 Data Discovery Best Practices
  59. Cookie Banner: What is it & why you need one?
  60. CPRA Do Not Sell or Share My Personal Information – Definition
  61. Data Discovery for GDPR: Ensuring Personal Data Compliance
  62. Understanding Valid Consent Requirements | A Closer Look at the Draft Guidelines Issued by the Quebec Data Protection Authority
  63. EU Commission Adopts New EU-US Data Privacy Framework (EU-U.S. DPF)
  64. Safeguarding Enterprise Data | The Significance of Google’s Privacy Policy Update
  65. Everything you need to know about Exact Data Match Classification
  66. A Guide to Navigating the UK DPA’s Updated Guidance on Subject Access Requests (SARs) for Employers
  67. Email Marketing Legal Requirements: A Comprehensive Guide for Businesses
  68. GDPR Data Mapping: What it is and How to Comply?
  69. China’s New Measures for Security Assessment of Data Exports: Explained
  70. Insights into the Digital Services Act: Unveiling the First Designated Very Large Online Platforms and Search Engines
  71. Learning from the Fallout | A Massive $1.3 Billion Fine for Violating EU’s Cross-Border Data Transfer Regulation
  72. China’s New Rules for Personal Information Protection Certification: All You Need To Know
  73. ITAR Exemptions: Navigating the Regulations to Avoid Penalties
  74. China’s Cross-Border Data Transfer Regime For Overseas Businesses: Explained
  75. Shopify Stores Privacy Policy: What you need to know?
  76. Gramm-Leach-Bliley Act (GLBA) Privacy Notice: What To Know
  77. Snowflake and Securiti Partnership Enables Data Innovation at Scale
  78. 7 Core Controls of a Solid Data Governance Strategy
  79. Data Governance Vs. Data Security: What To Know
  80. Privacy-by-Design and Privacy-by-Default
  81. 4 Keys to Managing Data Breach Risk
  82. The Ultimate CCPA Compliance Checklist
  83. FTC Cracks Down on Unauthorized Disclosure of Health Information for Advertising: A Roundup of Recent Enforcement Actions
  84. ANPD’s Regulation on Administrative Sanctions: Overview
  85. A Guide to Healthcare Compliance Regulations
  86. 4 Types of Personal Data Under the California Consumer Privacy Act (CCPA)
  87. Understanding the Revised China Cross-Border Certification Guidelines V2.0
  88. Mitigating the Risks of Sensitive Data Sprawl Within Streaming Environments
  89. How Data Classification Can Help You Comply with GDPR?
  90. ITAR Requirements for Employees: A Comprehensive Guide
  91. From Inventory to Insights: 6 Key Steps On How Financial Organizations Can Leverage Data for Competitive Advantage
  92. Consent Requirements in the Czech Republic for the Use of Cookies and Similar Technologies
  93. ITAR Violations: Types, Examples & Consequences
  94. The Ultimate Guide to Privacy Impact Assessments for CPRA
  95. Mitigating Risks to Maximize Data Value: Optimizing Streaming Environments for Financial Organizations
  96. Cookie Consent Requirements in Australia
  97. German Guide on TTDSG: Consent and Cookies
  98. Behind the Pixel: Understanding the Risks and Impact of Pixel Tracking
  99. A Whopping $520M Settlement – Tips to Avoid Noncompliance Penalties
  100. Unlocking the Power of Financial Services Data: How Access Controls Enable Innovation
  101. Understanding Zero Trust Data Security in the Spotlight of The National Cybersecurity Strategy
  102. Privacy Impact Assessment: What It Is and How to Conduct One
  103. The Current State of Technology: An Interview with Giuliano Liguori
  104. CPRA Final Regulations: Important Changes To Know
  105. Joe Biden’s SOTU: The US’ Long & Complicated History With Data Privacy
  106. China Measures for Standard Contracts for the Exit (Export) of Personal Information 2023
  107. EDPB Guidance on Deceptive Patterns in Social Media Interfaces
  108. Driving Innovation and Business Value through Data Access Insights
  109. Direct Marketing Requirements under Australian Law
  110. What is Personally Identifiable Information (PII)?
  111. Privacy Policy for Websites: Requirements & How To Create It
  112. Assuring Compliance with Geographic Regulations around Cross-Border Data Transfers
  113. How to Enhance Snowflake Data Sharing Environments Securely
  114. Driving Success & Ensuring Privacy: An Interview with Jeff Fritz
  115. Navigating the Landscape of Privacy Startups: An Interview with Alvin Foo
  116. What to Expect for Privacy in 2024
  117. LGPD Privacy Policy Requirements – The Basics To Know
  118. ITAR Compliance in the Cloud: 6 Data Security Measures
  119. The European Commission of the View US Data Privacy Framework Offers Adequate Protection to the EU Personal Data, Publishes Draft Adequacy Decision
  120. Need For Better Data Management: PPC Issues Report On Data Processing From Surgical Videos
  121. An Overview of the UK’s First Data Adequacy Decision Bridging the Data Transfer Gap with South Korea
  122. Privacy Training: Why Is It Required For Employees?
  123. The UK-US Data Access Agreement (DAA) – Here’s What We Know
  124. Sarbanes-Oxley Compliance Checklist: How to Comply with SOX
  125. Andorra’s Guidelines on the Use of Cookies
  126. PII Compliance Checklist & Best Practices
  127. Incident Management Best Practices: What Your Organization Needs
  128. EDPB Guidelines on Identifying Lead Supervisory Authority
  129. Are You Using Tracking Technologies That Collect Protected Health Information Under HIPAA?
  130. UK Guide on Direct Marketing via Email
  131. The 5 Upcoming US State Privacy Laws in 2023 You Need to Lookout For
  132. The Swedish Privacy Protection Agency Gives Permission to Run Background Checks For Legal Violations
  133. An Overview of OECD’s Report Highlighting Concerns Over Dark Patterns
  134. An Overview of Uganda’s Computer Misuse Amendment Act 2022
  135. California Privacy Rights Act Exemptions – Explained
  136. What is Data Minimization Under the CPRA?
  137. An Overview of Saudi Arabia’s Proposed Amendments to PDPL (Amended Draft)
  138. Privacy and Personal Information Protection Amendment Act 2022: What To Know About the New MNDB Scheme for New South Wales
  139. Organizations Face Friction in Overcoming CPRA Compliance Challenges
  140. CPRA Expanded Private Right of Action
  141. An Overview of Netherlands’ Updated Guidelines for Online Consumer Protection
  142. Lower Saxony Guidelines on Cookies
  143. Stricter Penalties for Privacy Breaches In Australia
  144. Cookie Consent Requirements in Slovakia
  145. Consent Requirements Under Thailand’s Data Protection Framework
  146. Indonesia Personal Data Protection Law and Consent Requirements
  147. GDPR Data Controllers vs Processors
  148. Data Subject Access Requests in Ireland
  149. How to Handle Data Subject Access Requests from Employees & Ex-Employees?
  150. Employee Privacy Rights: What You Need to Know
  151. European Commission’s Proposed Artificial Intelligence Regulation
  152. Brazil’s Guidance on Cookies
  153. CPRA Training Requirements – Section (999.317) Compliance
  154. Cookie Consent Requirements: Everything You Need To Know
  155. What is a Persistent Cookie?
  156. What is a GDPR-Compliant Privacy Notice & How to Automate it with Securiti?
  157. Biggest Data Breaches Caused by API Mistakes
  158. Privacy Law Certification: Everything You Need to Know
  159. GDPR Personal Data: What is & What is Not Considered as Personal Data?
  160. The Revised Swiss Federal Act on Data Protection
  161. Australia Joins Global Cross-Border Privacy Rules Forum
  162. GDPR Data Collection Requirements
  163. Understanding FIFA 2022 World Cup Cybersecurity Framework
  164. CCPA Data Collection: What Do You Need to Know?
  165. What Changes Do Russia’s Latest Data Privacy Amendment Bring?
  166. How do CPRA treat sensitive personal information
  167. Data Breach Assessment Infographic
  168. China’s Ride-Hailing Behemoth Didi Fined $1.2 Billion For Violating Cybersecurity Laws
  169. A Guide to Intended Reforms to UK’s Data Protection Framework and the UK Digital Information Bill
  170. Data Subject Access Request (DSAR) – All You Need to Know
  171. CBN Issues Risk-Based Cybersecurity Framework & Guidelines
  172. Article 32 Of The GDPR: Explained
  173. Data Flow Intelligence & Governance
  174. Understanding Cross Borders Data Transfers Under GDPR and PIPL
  175. California Privacy Rights Act (CPRA) Compliance Checklist
  176. CCPA Data Discovery: The First Step Towards Personal Data Compliance
  177. Article 6 of the GDPR: Explained
  178. Austrian DPA Cookie FAQs
  179. Employer’s Data Obligation Under Thailand’s PDPA
  180. Data Subject Rights under California Privacy Rights Act (CPRA)
  181. Network Advertising Initiative Best Practices
  182. GDPR Cookie Consent: Requirements & How to Comply?
  183. The UK International Data Transfer Agreement (IDTA) Explained
  184. What Does User Consent Mean and Why Does It Matter?
  185. Latvian Guide on the use of Cookies
  186. Consent & Cookies under the Japanese Amended APPI
  187. Australia State Law Tracker
  188. Evolving Cookie Landscape and Consent Management
  189. The Need of Privacy Certifications for Lawyers
  190. Difference Between Legacy Privacy Framework and Modern Privacy Framework
  191. Data Protection Law in South America
  192. The Need of PrivacyOps Certification for Privacy Graduates
  193. Stipulated Breach Response Fines In Various Privacy Laws
  194. Google Ends FLoC, Introduces New Replacement For Cookies
  195. New Data Protection Laws 2022
  196. Google Analytics’ Operations in Trouble Within the European Union?
  197. Biggest GDPR and CCPA Fines Learnings for 2022
  198. LGPD for Small Businesses and Startups
  199. 6 Lessons From the EDPB’s Draft Guidelines on Rights of Access Under the GDPR
  200. The Difference Between First Party Vs Third Party Cookies
  201. Cookie Text: A Comprehensive Guide
  202. Ultimate Guide to EU Cookie Laws
  203. What is Cookie Notice and Its Examples?
  204. Checklist of Asia Data Protection Laws
  205. Facebook & Google Face €210m Fine For Privacy Non-Compliance
  206. Understand Cookie Policy Requirements Under CCPA, GDPR & Other Laws
  207. African Data Protection Laws
  208. What Does European Commissions’ Adequacy Decision Mean?
  209. Overview of UAE Data Protection Law
  210. UAE Data Protection Law Compliance Checklist
  211. A Quick Guide to Data Access Controls for Snowflake
  212. Operationalizing the EDM Council’s New Cloud Data Management Capabilities (CDMC) Framework
  213. Snowflake Migration Best Practices
  214. What Are Tracking Cookies?
  215. China’s Administrative Regulations on Network Data Security
  216. Workday focuses on GDPR employee data protections
  217. CPRA Data Discovery: The Step Towards Personal Data Compliance
  218. Luxembourg’s Guidelines on Cookies
  219. LGPD Data Discovery: The step towards personal data compliance
  220. Implementing the EDM Council’s CDMC Framework
  221. Securiti Joins Snowflake Governance Accelerated Partner Program to Automate Data Governance At Scale
  222. Understanding Workday Security: Meeting Compliance with Best Practices
  223. China Stresses for Data Exit Security Evaluation of Firms Seeking to Trade User Data
  224. How Sensitive Data Discovery Helps Secure PII (Personally Identifiable Information)
  225. Securiti Announces Integration with Microsoft 365 to Automate Data Privacy Management
  226. Analysis of Apple’s iOS 14.5 Consent Prompt for Tracking
  227. Consent Requirements in Russia
  228. 10 major changes in China’s finalized PIPL
  229. Understanding the Value of Data Privacy Certifications
  230. Data Discovery with Snowflake: 5 Things You Need to Know
  231. Why Data Discovery is Essential for PCI DSS Compliance
  232. Security & Privacy Layers in Snowflake – Overview
  233. Address Data Discovery Challenges with Automated Data Intelligence
  234. How to ensure compliance with global consent requirements?
  235. Data Discovery for Securing Sensitive Data on the Cloud
  236. Multicloud Data Security and Privacy in Hyperscale Environment
  237. Here’s What ‘China’s GDPR’ Means For International Businesses
  238. Compliance Checklist for China’s CSL
  239. Autonomous Data Intelligence, Governance, Privacy, & Protection for the Snowflake Data Cloud
  240. Data Governance for Snowflake: What You Need to Know
  241. Exploring the Intersection of Data Privacy and Data Security
  242. Trust and Compliance in an Evolving Cookie Landscape
  243. Compliance Checklist for China’s Data Security Law (DSL)
  244. GDPR Compliance for Snowflake – All You Need to Know
  245. Employee Personal Data Protection in China
  246. Snowflake Security – The 4-Step Guide To Securing Sensitive Data
  247. Navigating Employee Data Through Australian Privacy Act
  248. Privacy Rights of Global Employees in the Era of Work from Anywhere
  249. 6 Core Features of Sensitive Data Intelligence
  250. DSARs may include internal communication
  251. Le Figaro fined €50,000 for lack of full cookie consent
  252. How to Manage Employees’ Data Under Singapore’s Personal Data Protection Act (PDPA)
  253. What HR Need to Know About LGPD’s Employee Data Protection
  254. Protecting Employees’ Data Under New Zealand’s Privacy Act
  255. What GDPR Means For Employee Data
  256. Cookie and Consent Practices in Finland
  257. CPRA Employee Data Obligations
  258. Is Your Privacy Notice In Your User’s Language?
  259. Italy’s new Guidance on Cookies and similar Tracking Technologies
  260. Everything You Need to Know About CPRA Data Sharing Requirements
  261. Notification of a Personal Data Breach under GDPR compliance
  262. Google delays its timeline to phase out third-party cookies
  263. EU Commission granted the UK Adequacy Status
  264. The Ultimate Guide to Cookie Laws & Regulations
  265. EDPB Guidelines on Targeting of Social Media Users
  266. EU’s Revamped SCCs
  267. Compliance Checklist for South Africa’s POPIA
  268. The Future of Employee Data Under California Consumer Privacy Act (CCPA)
  269. A Step by Step Guide for Marketers to be GDPR Compliant
  270. The Impact of CCPA on Marketing: 2024 Survival Guide
  271. EDPB recommends collecting consent to store credit card details for future transactions
  272. Right to delete under California Consumer Privacy Act (CCPA)
  273. European Parliament Rejects UK Draft Adequacy Decisions
  274. EU Parliament adopts Resolution on data transfers following Schrems II Ruling
  275. Updates on EU’s e-Privacy Regulation: What you need to know
  276. What is Sensitive Data & How to Determine it?
  277. CCPA Data Mapping: What Do You Need To Know?
  278. EDPB Opinions on UK Adequacy: Strong Alignment but Challenges Remain
  279. CNIL updated FAQs on cookies guidelines: Deadline to comply ends on 1st of April
  280. Multicloud Data Security and Privacy for Hyperscale Environment
  281. Denmark New Guidance (Quick Guide) on Cookies
  282. The role of treatment agents on the data subject’s right to informative self-determination
  283. Italy’s New Guidance on Cookies and Similar Tracking Technologies
  284. Consent or Pay | Privacy Considerations with Cookiewall-Paywall Hybrid Solution
  285. The New EU e-Privacy Regulation Draft
  286. Post Schrems-II: 5 Essential To Dos For Transatlantic Data Flows
  287. The Future of Data Privacy Under The New Administration
  288. State of data privacy and security
  289. Compliance Checklist for New Zealand’s new Privacy Act
  290. International data transfers under New Zealand’s new Privacy Act
  291. Data Intelligence for Snowflake
  292. LGPD: Data Protection and Information Security in Brazil
  293. Spanish Guide on the Use of Cookies
  294. Learn why every Facebook advertiser is at risk of CCPA non-compliance, and how should they respond
  295. What is new in the California Consumer Privacy Rights Act?
  296. Sensitive Data Intelligence Driven Privacy and Protection
  297. CNIL Updated Cookie Guidelines
  298. IAB EU Solution: We are proud to announce that securiti.ai’s Consent Management Platform is officially TCF v2.0 approved by the IAB
  299. Irish Guidance on Consent & Cookies – Grace Period ends on 5 October
  300. Why you need to adopt Securiti’s Consent Management Platform
  301. Assessing Safeguards for Cross Border Data Transfers Post Schrems-II
  302. EDPB’s Updated Guidelines on Consent
  303. Schrems-II judgment opens door for complaints on EU-US transfers
  304. The e-Privacy Directive and the e-Privacy Regulation – What to Expect
  305. Evolve Your Data Mapping
  306. The Privacy Shield has been broken: What’s Next?
  307. Practical Implementation of the Changes Introduced by New Zealand’s New Privacy Act
  308. 10 Tips to Prepare for CCPA Enforcement
  309. The Solution to Overcoming Healthcare Compliance Challenges
  310. Securiti named “Most Innovative Startup 2020” for AI-Powered PrivacyOps, by RSAC 2020
  311. Accelerating business value with PrivacyOps
  312. When it Comes to CCPA, Manual Methods Can Kill You
  313. Wall Street Journal Highlights How securiti.ai Can Help Companies Comply with CCPA and Data-Privacy Laws

Webinars

  1. Navigating the Future of Data: A Conversation with Rex Davis, CDO of Royal Bank of Canada
  2. Innovating in Financial Services: Safely Harness Data+AI
  3. A Smarter Approach to Protecting your Cloud, Data, and AI
  4. Enabling Safe Use of Data and Adoption of GenAI
  5. Mastering the art of AI governance to unlock generative AI innovation
  6. Exceptional Marketing Campaigns with Trusted Data from Securiti and Snowflake
  7. Data Protection and Governance in the Age of GenAI
  8. Oversight of AI
    Principles for Regulation
  9. How to enable
    safe use of Data and GenAI
  10. Foundations of a
    Next-Gen Data Security Program
  11. Foundations for
    an effective AI governance program
  12. Mastering Data Security | A deep dive into DSPM strategies
  13. Data Controls, Generative AI, & Financial Services Needs
  14. Unwinding data silos | The new frontier in collaborative leadership
  15. UDC Democast | Secure sensitive data everywhere with Securiti DSPM
  16. Evolution of Data Controls in the Era of Generative AI
  17. Managing Privacy in the era of Generative AI
  18. Mitigating Risk while harnessing Generative AI
  19. Privacy beyond checkmarks: Law 25 & the evolving landscape of Canadian consent
  20. Enabling Safe Use of Generative AI with Data Controls
  21. DSPM Done Right! Maximize Cloud Data Security While Unifying all Data Controls
  22. Privacy Beyond Checkmarks: How to navigate Cross-Border Transfers
  23. EDM Council’s DataVision EMEA / Americas
  24. Managing Data in a Multi-Cloud Environment
  25. Applying Sensitive Data Intelligence to Multicloud Environments
  26. Data Command Center across Multicloud, SaaS and Private Cloud
  27. Building a Secure Foundation for Cloud Data Governance with CDMC
  28. User Consent in the Digital Age – Setting Your Consent Strategy when “Everything is Changing”
  29. Ready For CPRA?
  30. How Does Your Privacy Program Stack Up?
  31. Managing Cross-Border Data Transfers
  32. Privacy Next Summit 2022
  33. Innovate Safely in Multicloud with the CDMC Framework for Data Security, Privacy and Governance
  34. Insights from Forrester Guest Speaker on the Evolution of Privacy Management in 2022 and Beyond
  35. Operationalizing the EDM Council’s New Cloud Data Management Capabilities Framework
  36. Democratize your data without compromising security and privacy
  37. China’s PIPL Law – How it Can Affect You and What You Need to do NOW!
  38. Privacy Rights of Global Employees in the Era of Work from Anywhere
  39. Building and Measuring Consumer Trust in an Evolving Cookie Landscape
  40. The Future of Global Privacy & Automation
  41. Achieving the Data Privacy, Security & Compliance Trifecta
  42. Meeting Consent Compliance in an Evolving Cookie Landscape
  43. The 7 Sins of Managing Data Privacy
  44. Multi-cloud Data Security and Privacy for Hyperscale Environment
  45. Exploring the Impact of CPRA on organizations
  46. CIO Panel “Exploring the intersection of Data Privacy and Data Security”
  47. The Privacy Dilemma
  48. Sensitive Data Intelligence Driven Privacy Automation
  49. Data Privacy & Protection for Hospitality and Travel Industries
  50. Navigating the Impact of “Schrems II” and Cross-Border Data Transfers
  51. Privacy Act 2020 – What you need to do to Comply
  52. Evolve Your Data Mapping
  53. Trust vs Surveillance
  54. Lessons Learned: Navigating CCPA Compliance During a Global Pandemic
  55. A Scalable Approach for Patient Data Privacy
  56. Innovation from the Valley: How Silicon Valley is Responding & What it Means Post Pandemic to Australia & New Zealand
  57. Tackling Data Privacy in Times of Crisis
  58. Healthcare Data: Privacy + Security Automation
  59. Managing Privacy in Times of Crisis
  60. Processing DSRs – Lessons from the Early Days of CCPA
  61. Navigating the Perfect Storm of Personal Data for CCPA
  62. PrivacyOps: Rethinking Privacy Compliance as CCPA Becomes Reality
  63. Robotic Automation for CCPA Compliance with PrivacyOps
  64. A PrivacyOps Approach for CCPA and Beyond

Knowledge Center

  1. How can DSPM Reduces the Risk of Data Breaches?
  2. Brazil’s Guidance on Legitimate Interest
  3. Quebec 12 Priority Recommendations for Responsible Use of AI
  4. Compliance Checklist For Automated Decision-Making Under GDPR
  5. Third-Party Risk Management – What is it & How to Manage Third-Party Risks
  6. PSD2 Compliance: What You Need to Know
  7. China’s New Measures on the Administration of Internet Advertising: Basics To Know
  8. China’s Renewed Cross-Border Data Transfer Regime
  9. SOC 2 Compliance Checklist: Step by Step Guide for an Audit
  10. What is the HIPAA Security Rule? – Explained
  11. What to Know About Saudi Arabia’s Generative AI Guidelines
  12. A Comprehensive Guide to CAN-SPAM Act Compliance
  13. What is CAN-SPAM Opt-Out and Its Process?
  14. CAN-SPAM Email Compliance: Guidelines for Email Marketers
  15. Brazil’s New AI Law: What You Should Know
  16. What To Know About The SEC’s New Rules on Cybersecurity Risk Management
  17. An Overview of Thailand’s Cross-Border Data Transfer Regime
  18. What is AI Safety?
  19. The Presidio AI Framework: Chart the Future of AI Innovation Responsibly
  20. What to Know about the CJEU Ruling on Automated Individual Decisions by Schufa
  21. China’s Regulation on Protection of Minors in Cyberspace
  22. NIST Privacy Framework: A Comprehensive Guide 2024
  23. A Privacy Policy Template: What To Include
  24. What are Data Subject Rights Under LGPD?
  25. The Role of GLBA Risk Assessment – Safeguarding Customer Data
  26. Mastering GLBA Safeguard Rule: Protecting Financial Information
  27. GLBA Compliance Requirements – A Complete Checklist
  28. GLBA Pretexting Rule – Guarding Customer Data Against Deceptive Practices
  29. Exploring GLBA’s Non-Public Personal Information Definition
  30. Regulation Z (Truth in Lending): Important Details To Know
  31. Privacy of Consumer Financial and Health Information: What To Know
  32. Data Privacy Legislation in Focus| A Deep Dive into India’s DPDP Act & EU’s GDPR
  33. Fair Credit Reporting Act (FCRA) Compliance Checklist
  34. 5 Most Common FCRA Violations & Penalties
  35. Your Roadmap to Compliance| ICO’s Guidance on DSARs
  36. Rite Aid Banned From Use of AI Facial Recognition | FTC Complaint’s Implications
  37. What is the Difference Between GDPR and HIPAA?
  38. What is HIPAA Violation?
  39. HIPAA Privacy Rule:| In-depth Guide
  40. What Does Data Governance Mean in the HIPAA & Healthcare Industry?
  41. HIPAA Training Requirements
  42. HIPAA Risk Assessment | What It Is and How to Perform It
  43. HIPAA Compliance Checklist | All You Need to Know
  44. AI Risk Assessment | Mitigating Risks in the Age of Generative AI
  45. Navigating the AI Regulatory Maze | A Guide for Businesses in 2024
  46. What is Vendor Risk Management (VRM) & How Does it Work?
  47. Cookie Laws, Regulations & Requirements Around the World Q1, 2024
  48. GDPR Article 15 Compliance | Empowering Data Subjects Across EU
  49. Basics to Know About Article 29 of the GDPR
  50. What You Should Know About Article 35 of the GDPR
  51. What are GDPR Data Subject Rights?
  52. Notice and Consent Requirements in China
  53. Healthcare Privacy Laws & Regulations Around the World
  54. Biometric Privacy Laws & Regulations Around the World
  55. What To Know About NAIC Model 670 | Insurance Information and Privacy Protection Model Act
  56. What To Know About NAIC Model 668 | The Insurance Data Security Model Law
  57. What To Know About NAIC Model 673 | Standards for Safeguarding Customer Information Model Regulation
  58. Genetic Information Privacy Laws & Regulations Around the World
  59. Navigating Generative AI Governance: Risks & Challenges To Consider
  60. Navigating Consent in Compliance | Understanding the Colorado Privacy Act’s Stance on Re-obtaining Consumer Consent
  61. Generative AI Security Risks & How to Mitigate Them
  62. ROT Data Minimization | Reducing Data Attack Surface & Cost
  63. What is Data Retention? | Best Practices, Benefits & Examples
  64. What Does Double Opt-in Mean & Which Countries Require Double Opt-in Consent?
  65. Unraveling PCI DSS Encryption Requirements
  66. 7 Benefits of PCI DSS Compliance
  67. The Cost of Non-Compliance: Understanding PCI DSS Penalties
  68. Understanding 4 PCI DSS Compliance Levels
  69. What are the Data Subject Rights Under Singapore’s PDPA?
  70. 10 Steps to Complete the DSAR Process
  71. What is PCI DSS and Its 12 Requirements to Comply?
  72. What is the Cost of Handling DSRs? Manual vs Automated
  73. Privacy by Design: Embracing ISO 31700-1:2023’s Consumer Protection Guidelines
  74. What are the 12 PCI DSS Compliance Requirements?
  75. Understanding AI Governance: A Strategic Approach for Businesses
  76. How to Develop an Effective AI Governance Framework?
  77. An Overview of the Consumer Financial Protection Bureau’s (CFPB) Truth in Savings (Regulation DD)
  78. South Korea’s Safe Use of Personal Information in the Age of AI Guidance: What You Should Know
  79. New Zealand’s Privacy Commissioner Issues Guidance on AI Usage
  80. What is PCI DSS Certification? Everything You Need To Know
  81. What is the Fair Credit Reporting Act (FCRA)?
  82. An Overview of the Panama Personal Data Protection Law (PPDPL)
  83. Basics to Know About the California Delete Act
  84. How Will China’s Generative AI Regulations Shape the Future?
  85. PCI DSS 4.0: What You Need to Know
  86. PCI Compliance Checklist & Requirements
  87. The Impact of the GDPR on Artificial Intelligence
  88. UAE’s DIFC Issues Adequacy Decision Recognizing CCPA for Cross-Border Data Transfers
  89. 3 Key Takeaways For DSPM from Gartner’s Innovation Insight Report
  90. Understanding the Shanghai AI Regulations
  91. An Overview of Small Business Lending Rule (Final Rule)
  92. An Overview of FTC’s Red Flags Rule (Identity Theft)
  93. An Overview of Canadian Guardrails for Generative AI
  94. ANPD Begins LGPD Enforcement | Meta & Telekall Infoservice In Crosshairs
  95. Navigating Generative AI Privacy | Challenges & Safeguarding Tips
  96. CPRA Privacy Policy | Important Bits to Know
  97. What to Know About Canadian Center for Cyber Security’s Guidance on Generative AI
  98. Right of Access to Personal Data: What To Know
  99. Kuwait’s DPPR
  100. DSR Fulfillment Timeline: What You Should Know
  101. The UK GDPR & Data Protection Act (DPA) 2018: Explained
  102. Indonesia’s Protection of Personal Data Law: Explained
  103. What is ITAR Compliance? Regulations, Fines & Challenges
  104. American Data Privacy and Protection Act (ADPPA): Explained
  105. An Overview of Illinois Biometric Information Privacy Act (BIPA)
  106. An Overview of the California Age-Appropriate Design Code Act (ADCA)
  107. What is Global Privacy Control (GPC) & How Does it Work?
  108. What is a Preference Center & Why Is It Important?
  109. What is a Privacy Center & Why Does It Matter?
  110. What is Privacy Notice?
  111. Do Not Track: Everything You Need To Know
  112. What is First-Party Data & Why Do Organizations Collect?
  113. What is Privacy Management? Benefits & Tools
  114. What is a Data Breach? Definition, Consequences & Best Practices
  115. What is a Privacy Policy | A Complete Guide
  116. NIST AI Risk Management Framework (AI RMF 1.0) Explained
  117. Top 6 DSPM Use Cases for Optimal Data Security
  118. EU Data Governance Act: What do you need to know?
  119. What is LGPD
  120. What is California Consumer Privacy Act (CCPA)
  121. CCPA vs GDPR
  122. LGPD vs CCPA
  123. Unveiling the Data Paradigm: An Interview with Paul Lewis
  124. Delving into AI’s Impact: An Interview with Markus Eisele
  125. LGPD vs GDPR
  126. What is Egypt’s Data Protection Law
  127. What is LPPD?
  128. Virginia Consumer Data Protection Act (VCDPA)
  129. What To Know About The Russian Federal Law No. 152-FZ
  130. What is GDPR
  131. EU Artificial Intelligence Act
  132. What is the Gramm-Leach-Bliley Act (GLBA)?
  133. Qatar Personal Data Privacy Protection Law (PDPPL)
  134. An Overview of Montana’s Consumer Data Privacy Act (MCDPA)
  135. An Overview of Virginia’s Genetic Data Privacy Law
  136. An Overview of Iowa’s Data Privacy Law – Senate File 262
  137. India’s Digital Personal Data Protection Act 2023 (DPDP Act)
  138. An Overview of Indiana’s Consumer Data Protection Act (ICDPA)
  139. Tennessee Information Protection Act (TIPA): What You Need to Know
  140. An Overview of Vietnam’s Decree No. 13/2023/ND on the Protection of Personal Data (Decree)
  141. CPRA vs. GDPR | The notable similarities and differences
  142. The Texas Data Privacy and Security Act (TDPSA): Overview
  143. CPRA vs. CCPA: What’s the Difference?
  144. What is Data Classification? Types, Examples & Steps
  145. An Overview Delaware Personal Data Privacy Act (DPDPA) – HB 154
  146. What is Data Access Governance?
  147. An Overview of Oregon’s Consumer Privacy Act (Senate Bill 619)
  148. The Children’s Online Privacy Protection Act of 1998 (COPPA): What You Should Know
  149. An Overview of Emerging Global AI Regulations
  150. An Overview of Florida’s Digital Bill of Rights
  151. Overview of the Connecticut Data Privacy Act (CTDPA)
  152. Basics To Know About Washington’s My Health, My Data Act
  153. DSPM vs CSPM: Understanding the differences for Optimal Data Security
  154. What is Consent Management Platform (CMP) & Why Do You Need It?
  155. Top 7 Data Governance Best Practices
  156. Understanding Saudi Arabia’s Personal Data Protection Law (PDPL)
  157. What is Data Security Posture Management (DSPM) – Maximizing Data Protection
  158. What is Data Governance and Why Is It Important?
  159. What is Data Privacy & Its Types?
  160. What is Data Loss Prevention (DLP) and Why Is It Important?
  161. What is Colorado Privacy Act (CPA)
  162. US State Law Tracker
  163. What is Data Mapping?
  164. Privacy Policy vs. Privacy Notice: What’s the Difference
  165. Overview of Thailand’s Personal Data Protection Act (PDPA)
  166. Andorra’s Qualified Personal Data Protection Law
  167. GDPR Articles 101: The Ultimate Reference Guide
  168. Utah’s Consumer Privacy Act (UCPA)
  169. Summary of CPRA – A Section by Section Overview of the California Privacy Rights Act
  170. Peru’s Data Protection Law
  171. Overview of Japan’s Act on the Protection of Personal Information (APPI)
  172. Overview of Sri Lanka’s Personal Data Protection Act
  173. Overview of Oman’s Personal Data Protection Law (PDPL)
  174. Overview of the Recent Amendments to Nevada’s Privacy Law
  175. What is the Cloud Data Management Capabilities (CDMC)?
  176. Overview of Zimbabwe New Data Protection Act
  177. Overview of South Korea Personal Information Protection Act (PIPA)
  178. Abu Dhabi Global Market Data Protection Regulation
  179. New Zealand’s Privacy Act of 2020
  180. CPRA vs CCPA vs GDPR – What’s the Difference?
  181. California Privacy Rights Act (CPRA)
  182. GDPR & UAE’s New Data Protection Law: Key Similarities To Know
  183. What is Unstructured Data with Examples?
  184. Quebec’s Law 25: Data Protection and Privacy Act Overview
  185. France Data Protection Act
  186. Switzerland’s Federal Act on Data Protection FADP
  187. Italy General Data Protection Regulation Overview
  188. Spain Data Protection Law Overview
  189. Germany Federal Data Protection Act
  190. Overview of UAE’s Federal Decree-Law No. (45) of 2021 on PDPL
  191. Overview of Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA)
  192. Overview of Rwanda’s Data Protection Law
  193. Overview of Malaysia’s Personal Data Protection Act
  194. Overview of Indonesia’s Draft Data Protection Law
  195. Global Privacy Compliance Checklist [Updated 2024]
  196. Data Privacy Laws and Regulations Around the World
  197. GDPR vs. POPIA: Comparing South African Version
  198. Overview of Personal Information Protection Law of the People’s Republic of China
  199. What is China’s Data Security Law?
  200. Bahrain’s PDPL vs. GDPR
  201. What is the California Privacy Protection Agency?
  202. South Africa’s Protection Of Personal Information Act (POPIA)?
  203. Overview of Philippines Republic Act 10173
  204. What is Irish Data Protection Act of 2018
  205. An Overview of Hong Kong’s Personal Data (Privacy) Ordinance (PDPO)
  206. What is Singapore’s Personal Data Protection Act (PDPA)?
  207. LPPD vs GDPR
  208. What is China’s Cybersecurity Law

White Papers

  1. Timeline of the Executive Order on the Safe, Secure & Trustworthy Development and Use of AI
  2. Harnessing Unstructured Data for GenAI
  3. The CISO Guide for Securing GenAI Applications
  4. Introduction to Evolving Data Privacy Laws: Frequently Asked Questions
  5. An Overview of Singapore’s Data Privacy and Cybersecurity Landscape
  6. Navigating AI Compliance: An Integrated Approach to the NIST AI RMF & EU AI Act
  7. Navigating the Future: How the EU AI Act Shapes AI Governance
  8. An Overview of Saudi Arabia’s Data Privacy and Cybersecurity Landscape
  9. US Federal AI Governance
  10. AI Risk Management Frameworks
  11. Google CMP Requirements
  12. Chief Privacy Officer Guide: Responsible Use of Generative AI
  13. An Overview of UAE’s Data Privacy & Cybersecurity Landscape
  14. Navigating NDMO Data Management & Personal Data Protection Standards
  15. 5 Steps to AI Governance: Ensuring Safe, Trustworthy, and Compliant Artificial Intelligence
  16. The Ultimate Guide to Securing Real-Time Streaming Data
  17. ISO 31700-1:2023 Consumer Protection – Privacy by Design for Consumer Goods and Services
  18. The CISO’s Guide to DSPM and Beyond: Securing Sensitive Data at Scale
  19. State of Global Consent Requirements, Q4 2023
  20. Navigating Security Standards: Ensure Compliance with ISO/IEC 27001, 27701 & SOC 2
  21. Beyond the Checklist: Mastering PCI DSS v4.0 Compliance
  22. State of Global AI Regulations
  23. Building a Framework for AI Governance
  24. Data Privacy in the Age of Generative AI
  25. Maximizing Growth in Finance | The Roadmap to Success with Data Command Center
  26. An Ultimate Guide to HIPAA Compliance
  27. Navigating Iowa’s Data Privacy Law – Senate File 262: Compliance and Implications for Businesses
  28. Colorado Privacy Act: Everything You Should Know
  29. NIST Privacy Framework White Paper
  30. Compliance with Brazil LGPD: Navigating Data Protection Complexity
  31. Canada’s Major Privacy Laws
  32. Australia’s Data Privacy & Cybersecurity: Securing Sensitive Information Guide
  33. Harnessing the Power of Data Governance for Financial Institutions: Overcoming Silos and Maximizing Data Potential
  34. An Overview of the Sarbanes-Oxley Act
  35. Virginia’s Consumer Data Protection Act (VCDPA): White Paper
  36. Indonesia’s PDPL Compared To The GDPR
  37. Achieving Compliance With The Amended Safeguards Rule 2022
  38. Cookie Consent Banner Templates
  39. EU-US Data Transfer Framework: Overview of Executive Order
  40. Secure Data Sharing: Implementing Access Intelligence and Controls
  41. Investing in Automated Incident Response: Financial Institutions
  42. Global Privacy Control: In-Depth Analysis with CCPA & CPRA Perspectives
  43. New Data Regulations in the European Union
  44. 5 Critical Consent Elements for Marketing Leaders
  45. Redefining Data Breach Management Framework in 2022
  46. An Overview of Global Healthcare Data Privacy Laws
  47. Understanding the EU US Transatlantic Data Privacy Framework
  48. Cross-Border Data Transfer Requirements Under Global Privacy Laws
  49. The Evolving Cookie Landscape and its Impact on Digital Marketing
  50. A Guide to Understanding the TCPA Consent Requirements
  51. MISA Securiti eBook
  52. Road to Compliance with Automated DSR Fulfillment
  53. How Different Privacy Laws Treat Employees Vaccination Data?
  54. Overcoming 7 Access Governance Challenges while managing data at scale
  55. 14 Key Controls for the Cloud & How To Implement the CDMC Framework
  56. The Ultimate Guide to China’s Data Protection Laws
  57. Global Data Subject Rights (DSRs) and Requirements
  58. GDPR Legal Basis & Requirements for Collecting Personal Data
  59. How China’s PIPL Compares to EU GDPR
  60. 6 Best Practices to Improve Privacy UX
  61. A Complete Guide to Employer’s Privacy Obligations
  62. 7 Essential Tips to Prepare for the CPRA
  63. European Union’s Revamped Standard Contractual Clauses (SCCs)
  64. What do you need to know about South Africa’s POPIA
  65. A Guide to Dynamic Privacy Policies and Notices
  66. Top 5 Data Security & Privacy challenges in Multicloud
  67. 5 Critical Consent Requirements in an Evolving Cookie Landscape
  68. Data Discovery Isn’t Enough. Meet Sensitive Data Intelligence
  69. State of Data Breach Notification Laws
  70. Secure Cloud Data Migration

What's
New