Data Protection/page/2 news and trends

Firms Eye Vendor Vulnerabilities as Enterprise Cybersecurity Risks Surge
Cybersecurity // May 27, 2025

In today’s age of hyperconnectivity, what happens to your enterprise partners will eventually happen to you. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily...

Why Does Google Want Multi-Cloud Security Platform Wiz So Badly?
Cybersecurity // March 18, 2025

The cloud environment is, as a class, mostly secure. But the way that enterprises, and their employees, actually utilize the cloud service ecosystem is not. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content...

Former CFPB Chief Technologist Tells Court Agency Cuts Put Data at Risk
CFPB // February 28, 2025

Former Consumer Financial Protection Bureau (CFPB) Chief Technologist Erie Meyer reportedly said in court documents filed Friday (Feb. 28) that the cancellation of cybersecurity contracts at the agency puts sensitive data at risk. Get the Full Story Complete the form to unlock this article and enjoy unlimited free...

Report: UK Orders Apple to Allow Access to User Data
Apple // February 07, 2025

Apple is reportedly facing an order from British authorities to give the government a way to access global user data stored in its cloud services. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content —...

Interviews & Exclusives
New Security Regulations Focus EU FIs on Third-Party Risk Management

January 17, 2025
With the Digital Operational Resilience Act (DORA) now in effect, organizations must pivot from preparation to active compliance and ongoing risk management, Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily newsletter, PYMNTS Today. By […]

Mastercard: New Use Cases Prep for ‘Total’ eCommerce Tokenization by 2030

December 19, 2024
Credit cards have long been a catnip for criminals. The lure is undeniable. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to...

New CFPB Proposed Rule Would Restrict Data Brokers’ Reach

December 03, 2024
As the year draws to a close, the end of 2024 has been marked by a flurry of rule-making by the Consumer Financial Protection Bureau (CFPB). Get the Full Story...

53% of Healthcare Organizations Have Automated Payment Workflows

September 19, 2024
The healthcare industry faces significant challenges with outdated payment and claims systems, which undermine financial stability and patient satisfaction. Despite the potential benefits of digital payments, the sector has been...

Quick Reads
Former CFPB Chief Technologist Tells Court Agency Cuts Put Data at Risk

February 28, 2025
Former Consumer Financial Protection Bureau (CFPB) Chief Technologist Erie Meyer reportedly said in court documents filed Friday (Feb. 28) that the cancellation of cybersecurity contracts at the agency puts sensitive data at risk. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. […]

Report: UK Orders Apple to Allow Access to User Data

February 07, 2025
Apple is reportedly facing an order from British authorities to give the government a way to access global user data stored in its cloud services. Get the Full Story Complete the...

Apple Says Siri Data Used Only to Improve Voice Assistant

January 06, 2025
Apple reportedly said Monday (Jan. 6) that data collected by its voice assistant, Siri, is used only to improve the product and has never been used for marketing or sold...

FTC Finalizes Order Requiring Marriott to Improve Data Security

December 20, 2024
The Federal Trade Commission (FTC) has finalized an order requiring Marriott International and its subsidiary Starwood Hotels & Resorts Worldwide to implement a comprehensive information security program. Get the Full Story Complete...