Category: Data Privacy

  • Q & A with GDPR Expert: What to know about Privacy and Security for IoT Devices

    Posted on July 13, 2018 by Sally Guenette

    This blog post lists the questions raised on TUV Rheinland OpenSky’s recent webinar: Approaches to Privacy and Security for IoT Devices in a GDPR World. For a recording of the webinar, please click here.
    Questions and Answers
    Question 1: Is GDPR targeting small to medium-sized companies? Learn More

  • Maintaining Consumer Privacy in an Era of Privacy Lost

    Posted on October 18, 2017 by TUV OpenSky Consumer Identity Center of Excellence

    The massive Equifax loss of 143 million non-consenting individual’s information in the US, Canada and UK presents more challenges for customer protection. Detailed financial data and private identifiers were included in the incident stemming from fundamental patch management latency. This consumer information loss aggravates an already challenged digital society seeking mobility-based services. Learn More

  • GDPR What to Expect in the Coming Months

    Posted on October 13, 2017 by John Gilda

    The General Data Protection Regulation (GDPR) is a new European data privacy regulation that will be fully enforced from on May 25th, 2018, after being ratified in April 2016. The time period between the two dates was designed to be the grace period for companies to use to be fully compliant by the due date.

    GDPR is also designed to be a privacy regulation that has more consideration for the data subject (you and me) rather than the business. Learn More

  • Ensure Weak Identity Assurance Isn’t Hurting Your Investments in Strong Authentication and Leaving You Exposed to Cyber-Attack

    Posted on April 11, 2017 by Mark Coderre

    The weakest link in the identity chain is moving from authentication to identification, a shift typical of compliance driven programs emphasizing authentication, and recognized by the newly drafted National Institute of Standards and Technology (NIST) eAuthentication standard. NIST 800-63-A, B, & C guidelines establish identity enrollment, proofing, authentication, and federation guidelines. Learn More

  • Sound Security Architecture is the Key to Digital Identity Assurance

    Posted on February 1, 2017 by Seth Art

    The weakest link in the identity chain is no longer authentication; it has moved!

    The identity chain has many links (Identify, Provision, Authenticate, Federate, Manage, De-Provision), and for years the reliance on passwords has made authentication the weakest link. The use of passwords for user authentication is often the one piece of the cyber security system whose creation and safety is left in the hands its users; rather than being entrusted to its designer and administrators. Learn More