All Breaches and Vulnerabilities articles – Page 4
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach? (LATAM region)
After the attack: Mitigating Organisational Impact of a Data Breach?
-
Article
Are You Ready For the Proposed Cyber Resilience Act?
The EU Commission’s proposal for a new Cyber Resilience Act (CRA) aims to safeguard consumers and businesses buying or using products or software with a digital component.
-
News
NHS Contractor Cyberattack: Ransomware, Supply Chains and Operational Resilience
When an NHS service provider was hit by ransomware earlier this month, an NHS spokesperson said the health service had “tried and tested contingency plans in place” to protect its own network.
-
News
LastPass Hack: To Disclose or Not to Disclose?
Users of the world’s most popular password manager, LastPass, received a shock on Thursday after the company notified them of “some unusual activity within portions of the LastPass development environment”.
-
Feature
Whistleblower Claims Regulators Weren’t Told About Twitter Security Risks — And Neither Was Twitter’s Board
Twitter’s former head of security, Peiter “Mudge” Zatko, made some serious allegations about the state of security and data protection in the company on Tuesday.
-
ebook
Anjuna: Protect Your Data Even If You Are Breached
Anjuna confidential computing software enables secure enclaves to secure data hardware-level encryption for end-to-end data protection.
-
Feature
Phishing, Third-Party Risk and the Signal and Twilio Attack
Communications provider Twilio suffered a phishing attack on 4 August. On Monday, 11 days later, messaging app Signal disclosed that some of its users have been impacted by the attack.
-
Webinar
Data Retention: The Blind Spot in your Privacy Programme (Central & Eastern Europe)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
The Human Element: Reducing Email Data Breaches By Combatting Human-Activated Risk
Did you know that 91% of cyberattacks are distributed by email and 82% of data breaches involve a human element?
-
Report
Charting the UK Data Protection Profession: June 2022 Report
Data Protection World Forum and The DPO Centre are delighted to bring you the eighth Index survey report from the ground-breaking UK Data Protection Index.
-
Video
Best Practices for Detecting, Preventing and Recovering From Ransomware
Ransomware continues to cause huge losses and harms across the globe. But taking a proactive approach to security and business continuity can reduce the likelihood of falling victim to an attack—and reduce the damage that occurs if you are targeted.
-
Video
The Dangers of AI-Driven Mass Surveillance
Artificial intelligence is driving huge improvements in fields as diverse as medicine and climate monitoring. But from biometric identification to “social credit” scoring systems, AI is also providing new ways for governments and large corporations to track and surveil people—with significant implications for their privacy and freedom.
-
Video
Can Privacy Enhancing Technologies (PETs) Solve the Data Transfer Puzzle?
The legal issues around data transfers continue to cause confusion and consume resources. Many believe the solution lies in Privacy Enhancing Technologies (PETs). The US and UK governments are even collaborating on an “innovation prize challenge” to encourage the development of PETs for data transfers.
-
Video
Keeping Pace with Emerging Threats
Cyber criminals are leveraging innovative techniques and taking advantage of new security vulnerabilities. Organizations must evolve and adapt their defenses to protect against the next wave of cybersecurity threats.
-
Video
Data Retention and Minimisation: Best Practice
Getting data retention and minimisation right is crucial to ensuring effective data protection compliance. Only collecting the data you need, and only storing it for as long as required, significantly reduces the likelihood of a data breach or other violation.
-
Video
How to Avoid Software Supply Chain Attacks
From Solarwinds to Kaseya to Log4j—the security risk from software supply chain attacks shows no sign of abating.
-
Feature
Risk and Resilience in a Dynamic Environment
Effective risk and resiliency within an organization is arguably the heart and soul of success.
-
Feature
Key Tactics for Effective Cybersecurity
As the pandemic pushed millions of workers home, corporations rushed to build infrastructure to support their new remote workforce.
-
Feature
Meet the expert: Jonathan Craven to speak at PrivSec World Forum
Privacy leader, Jonathan Craven will be among the experts speaking at PrivSec World Forum, this month.
-
News
The PICCASO Privacy Awards
To mark four years since the GDPR came into effect, Privacy Culture Limited & GRC World Forums in partnership with PICCASO are delighted to launch the inaugural ”PICCASO Privacy Awards” to recognise and celebrate the many extraordinary achievements of the wide community of privacy professionals.