What Salesforce Customers Need to Know About China’s Data Security Law

What Salesforce Customers Need to Know About China’s Data Security Law
On September 1st of this year, China’s Data Security Law went into effect, including strict guidelines on data residency. Combined with the existing Cybersecurity law and the PIPL regulation to come into effect on November 1st, this creates new requirements for data storage and processing. Companies that do business in China may need to keep some data in China only. This has significant implications for global companies that rely on Salesforce.
Watch Now

Spotlight

The Security Navigator reflects first and foremost the reality of the conflictual nature of cyber warfare. It mirrors the disinhibition of threat actors motivated by state strategies or hacktivism as well as criminal opportunities. In this environment, espionage, sabotage, disinformation and extortion are becoming increasingly i

OTHER ON-DEMAND WEBINARS

Enabling and Securing Remote Users of Teams

Microsoft recently reported that video calls on the Microsoft Teams platform grew more than 1,000% during the month of March, and they've added more than 12 million daily active users to the robust collaboration tool. According to Forrester, 85% of security breaches occur because of mismanaged licenses. Watch now to hear our sec
Watch Now

Whitehouse-driven Cyber Security Strategy and How it affects your Business

Join Presidio's very own Dan Lohrmann (author of Cyber Mayday and the Day After), and Andy Richter (author of Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployment) as we discuss the new Whitehouse-driven cyber security strategy and how it affects your business.
Watch Now

Attack Surface Detector

NopSec

Penetration testers can only assess the attack surface they can see. Attack Surface Detector is a set of open source tools that can identify web application attack surface through static code analysis, making the data easy to leverage in dynamic testing. Penetration testers can also highlight differences in attack surface between two different versions of an application.
Watch Now

Ask the experts: What’s the worst web application security issue?

Synopsys

We know. It’s an impossible question to answer. There’s no such thing as a “worst web application security issue,” because every app and every organization has its own unique set of issues. But if you’re a development organization with limited resources, how do you know where to start? Which issues appear over and over in data breaches, exploits, and top N lists such as the OWASP Top 10? We asked some experts—and Twitter—to give us their opinions.
Watch Now

Spotlight

The Security Navigator reflects first and foremost the reality of the conflictual nature of cyber warfare. It mirrors the disinhibition of threat actors motivated by state strategies or hacktivism as well as criminal opportunities. In this environment, espionage, sabotage, disinformation and extortion are becoming increasingly i

resources