FCC Proposes Stricter Requirements for Reporting Data Breaches
The Federal Communications Commission is the next US regulator hoping to hold companies more accountable for data breaches. From a report: Chairwoman Jessica Rosenworcel has shared a rulemaking proposal that would introduce stricter requirements for.....»»
No one has seen the data behind Tyson’s “climate friendly beef” claim
Millions of taxpayer dollars flow to livestock companies raising "low carbon" beef. Enlarge / The Environmental Working Group published a new analysis on Wednesday outlining its efforts to push the USDA for more transparency, inc.....»»
Rising knife crime in London is linked to austerity cuts to youth services—here"s the evidence
New data released by the Office of National Statistics (ONS) shows knife and gun crime in London rose sharply in the 12 months before December 2023......»»
Forcepoint ONE Data Security simplifies data protection with zero-trust principles for all organizations
Forcepoint introduced Forcepoint ONE Data Security, an enterprise-grade unified cloud-managed solution designed to simplify data protection with zero-trust principles for all organizations. The new Forcepoint SaaS solution provides unified management.....»»
March iPhone discounts in China may have saved Apple"s quarter
After a rough start to 2024, promotions on the iPhone appears to have buoyed Apple in China, according to official government data.iPhone doing well in China despite shrinking marketApple and its resellers cut prices in the end of February. This move.....»»
Relyance AI release Asset Intelligence and DSPM for data visibility and compliance
Relyance AI unveiled the release of Asset Intelligence and Data Security Posture Management, the first DSPM solution to bring together complete asset-level visibility and lineage to all sensitive enterprise data in the context of contractual and regu.....»»
U.S. “Know Your Customer” Proposal Will Put an End to Anonymous Cloud Users
Late January, the U.S. Department of Commerce published a notice of proposed rulemaking for establishing new requirements for Infrastructure as a Service providers (IaaS) . The proposal boils down to a 'Know Your Customer' regime for companies operat.....»»
Rightsholders Want U.S. “Know Your Customer” Proposal to Include Domain Name Services
The U.S. Department of Commerce has proposed new customer verification requirements for Infrastructure as a Service providers. The goal of the 'Know Your Customer' regime is to prevent fraud and abuse, including piracy. In response to this plan, pro.....»»
CJEU Gives File-Sharer Surveillance & Data Retention a Green Light
In a judgment published today, Europe's top court concludes that suspected file-sharers can be subjected to mass surveillance and retention of their data as long as certain standards are upheld. Digital rights groups hoped to end the French 'Hadopi'.....»»
Subscene’s Demise is No Surprise But Millions of App Users Face Disruption
After reporting that the site hasn't been financially viable for years, the operator of Subscene, one of the internet's most important subtitle sites, has pulled the plug. The plan had been known for some time and at least two, mostly complete backup.....»»
The Power of Data: Why Database Development Services are Crucial
In today’s data-driven world, information is king. Businesses of all sizes and across all industries rely on data to make informed decisions, drive growth, and gain a competitive edge. However, managing and organizing this ever-increasing amoun.....»»
Apple"s iPad upgrades march Lightning one step closer to death
After 11 years, 6 months, and 5 days of valiant charging and data service, the Lightning port is no longer on any iPad that Apple sells.You'll never see it again — a Lightning port on an iPadIt's easy to be glad about the move to USB-C for Apple de.....»»
NHTSA sends Tesla massive data request as it investigates Autopilot recall
Tesla has until July 1 to comply with the data request about its Autopilot recall. Enlarge (credit: Brandon Bell/Getty Images) The federal government has given Tesla quite the homework assignment. The electric automaker.....»»
Do you need a dentist visit every 6 months? That filling? The data is weak
Getting evidence-based care may be like pulling teeth, researchers suggest. Enlarge (credit: Getty | Julian Stratenschulte) The field of dentistry is lagging on adopting evidence-based care and, as such, is rife with ove.....»»
Non-governmental organizations raise concerns about child abuse reporting
Community organizations making child welfare reports to Oranga Tamariki say it's not uncommon to be met with delayed decisions or silence, even on high-risk cases, a new Otago study has found......»»
A new standard is raising the bar for HDR on PC
An updated DisplayHDR specification significantly raises the minimum requirements for displays looking to earn the badge......»»
Tesla Autopilot probe escalates with U.S. regulator’s data demands
Tesla Inc. is facing a July 1 deadline to furnish U.S. regulators with information about its biggest-ever recall because drivers using Autopilot keep crashing while using the system......»»
BigID introduces dual-scanning capabilities for cloud native workloads
BigID has introduced a new advancement in cloud data security, privacy, and governance with the launch of its dual-scanning technology. BigID’s dual, or “hybrid”, scanning technology gives organizations speed, efficiency, and flexib.....»»
Dive into our annual rankings, lists and enterprise reporting
A guide to Automotive News' lists, rankings and deep reporting so far this year......»»
Trellix Database Security protects sensitive data
Trellix announced an enhanced Trellix Database Security, available immediately. Trellix Database Security strengthens customers’ overall security posture by protecting sensitive data in leading database types, including legacy databases, from advan.....»»
Code42 unveils source code exfiltration detection and protection capabilities
Code42 has advanced its Incydr data protection product with new capabilities to see and stop source code leak and theft and ensure organizations can prevent potential breaches, without burdening developers or security analysts. Source code is the mos.....»»