article thumbnail

How is Regtech Enabling More Robust Data Protection and Privacy Compliance?

The Fintech Times

When it comes to cybersecurity, the topic of data protection and privacy is arguably one of the most important. With this in mind, we set out to find out how regtech is enabling more robust data protection and privacy compliance. Many regtech companies obtain ISO certifications to strengthen their GDPR alignment.”

Privacy 107
article thumbnail

GDPR and Biometric Data: Ethical Considerations and Privacy Implications

VISTA InfoSec

As technology advances and the use of biometric data becomes more prevalent, it is crucial to address the privacy concerns and regulatory compliance associated with this sensitive data. By addressing these issues, organizations can strike a balance between reaping the benefits of biometric technology and protecting individuals’ privacy.

Privacy 130
article thumbnail

Understanding the Cyber Risks in Video Communication

VISTA InfoSec

However, this convenience comes with significant cyber risks that can compromise sensitive information and privacy. Attackers can exploit weak security settings, such as the absence of meeting passwords , the use of default or easily guessable credentials, and the lack of end-to-end encryption.

Risk 242
article thumbnail

Data Privacy Vault Skyflow Secures $30 Million in New Funding

Finovate

Data privacy vault Skyflow has raised $30 million in an extension Series B round led by Khosla Ventures. Data privacy vault Skyflow raised $30 million in an extension of its Series B funding round. Photo by Gotta Be Worth It The post Data Privacy Vault Skyflow Secures $30 Million in New Funding appeared first on Finovate.

Privacy 59
article thumbnail

Proposed US Law Could Hamper End-To-End Encryption

PYMNTS

legislation will reportedly be introduced in the weeks to come that could hamper the capacity of tech firms to provide end-to-end encryption, Reuters reported. . Federal law enforcement agencies, for their part, have reportedly said those encryptions hamper their probes.

article thumbnail

The Role of PCBs in Cybersecurity

VISTA InfoSec

As fraudsters are continuously finding new ways to strike, we’re continuously finding new ways to prevent them with controls such as encryption, multi-factor authentication, fraud detection software, etc. The TPM can securely store and generate cryptographic keys, passwords, certificates, and encryption keys. However, manufacturers DO.

article thumbnail

Lucinity secures patent for federated learning AI, enabling secure data sharing

The Payments Association

This innovation was applied during a project with the Bank for International Settlements (BIS) Innovation Hub’s Nordic Centre that explored privacy-enhancing technologies and enhanced cooperation across institutions and borders. “We We believe in bringing connectivity to parts of the world where it wasn’t possible before.

AI 88