Discover the Digital Personal Data Protection Rules 2025, their implications for privacy, and when they take effect.
The Ministry of Electronics and Information Technology has finally notified the Digital Personal Data Protection Rules 2025 ( ...
To safeguard enterprise data in hybrid cloud environments, organizations need to apply basic data security techniques such as encryption, data-loss prevention (DLP), secure web gateways (SWGs), and ...
With cyber security and data protection being two sides of the same coin, it is no longer tenable for organisations to take a siloed approach to protecting data from cyber threats, according to backup ...
The DPDP rules call for the setting up of a Data Protection Board, a key regulatory body. The rules also guide data breach ...
To safeguard enterprise data in hybrid cloud environments, organizations need to apply basic data security techniques such as encryption, data-loss prevention (DLP), secure web gateways (SWGs), and ...
Congress has repeatedly failed to pass comprehensive national data protection legislation, and the states are rapidly filling the void with laws that impose different requirements on a state-by-state ...
Techniques to protect sensitive data have evolved over thousands of years, literally, but the pace of modern data protection is rapidly accelerating and presents both opportunities and threats for ...
Over the past decade, reforms around data regulation have re-enforced the message around data security and the need for robust security measures. These reforms are essential, considering how data ...
Maryland’s new data protection law, the Maryland Online Data Privacy Act (MODPA), takes effect October 1, 2025, and introduces stricter requirements for processing ...
As organizations become more data driven, they also store more data in more places and access it in more ways — with phones, tablets and laptops. These ever-connected endpoints serve as gateways to ...
We recently looked at how backup can be a key component to help organisations protect against ransomware attacks. But we also discussed the idea that all backup systems need to be audited to ensure ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results