All Breaches and Vulnerabilities articles – Page 6
-
NewsNHS Contractor Cyberattack: Ransomware, Supply Chains and Operational Resilience
When an NHS service provider was hit by ransomware earlier this month, an NHS spokesperson said the health service had “tried and tested contingency plans in place” to protect its own network.
-
NewsLastPass Hack: To Disclose or Not to Disclose?
Users of the world’s most popular password manager, LastPass, received a shock on Thursday after the company notified them of “some unusual activity within portions of the LastPass development environment”.
-
FeatureWhistleblower Claims Regulators Weren’t Told About Twitter Security Risks — And Neither Was Twitter’s Board
Twitter’s former head of security, Peiter “Mudge” Zatko, made some serious allegations about the state of security and data protection in the company on Tuesday.
-
ebookAnjuna: Protect Your Data Even If You Are Breached
Anjuna confidential computing software enables secure enclaves to secure data hardware-level encryption for end-to-end data protection.
-
FeaturePhishing, Third-Party Risk and the Signal and Twilio Attack
Communications provider Twilio suffered a phishing attack on 4 August. On Monday, 11 days later, messaging app Signal disclosed that some of its users have been impacted by the attack.
-
WebinarData Retention: The Blind Spot in your Privacy Programme (Central & Eastern Europe)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
WebinarThe Human Element: Reducing Email Data Breaches By Combatting Human-Activated Risk
Did you know that 91% of cyberattacks are distributed by email and 82% of data breaches involve a human element?
-
ReportCharting the UK Data Protection Profession: June 2022 Report
Data Protection World Forum and The DPO Centre are delighted to bring you the eighth Index survey report from the ground-breaking UK Data Protection Index.
-
VideoBest Practices for Detecting, Preventing and Recovering From Ransomware
Ransomware continues to cause huge losses and harms across the globe. But taking a proactive approach to security and business continuity can reduce the likelihood of falling victim to an attack—and reduce the damage that occurs if you are targeted.
-
VideoThe Dangers of AI-Driven Mass Surveillance
Artificial intelligence is driving huge improvements in fields as diverse as medicine and climate monitoring. But from biometric identification to “social credit” scoring systems, AI is also providing new ways for governments and large corporations to track and surveil people—with significant implications for their privacy and freedom.
-
VideoCan Privacy Enhancing Technologies (PETs) Solve the Data Transfer Puzzle?
The legal issues around data transfers continue to cause confusion and consume resources. Many believe the solution lies in Privacy Enhancing Technologies (PETs). The US and UK governments are even collaborating on an “innovation prize challenge” to encourage the development of PETs for data transfers.
-
VideoKeeping Pace with Emerging Threats
Cyber criminals are leveraging innovative techniques and taking advantage of new security vulnerabilities. Organizations must evolve and adapt their defenses to protect against the next wave of cybersecurity threats.
-
VideoData Retention and Minimisation: Best Practice
Getting data retention and minimisation right is crucial to ensuring effective data protection compliance. Only collecting the data you need, and only storing it for as long as required, significantly reduces the likelihood of a data breach or other violation.
-
VideoHow to Avoid Software Supply Chain Attacks
From Solarwinds to Kaseya to Log4j—the security risk from software supply chain attacks shows no sign of abating.
-
FeatureRisk and Resilience in a Dynamic Environment
Effective risk and resiliency within an organization is arguably the heart and soul of success.
-
FeatureKey Tactics for Effective Cybersecurity
As the pandemic pushed millions of workers home, corporations rushed to build infrastructure to support their new remote workforce.
-
FeatureMeet the expert: Jonathan Craven to speak at PrivSec World Forum
Privacy leader, Jonathan Craven will be among the experts speaking at PrivSec World Forum, this month.
-
NewsThe PICCASO Privacy Awards
To mark four years since the GDPR came into effect, Privacy Culture Limited & GRC World Forums in partnership with PICCASO are delighted to launch the inaugural ”PICCASO Privacy Awards” to recognise and celebrate the many extraordinary achievements of the wide community of privacy professionals.
-
FeatureMeet the expert: Bill Mew to speak at PrivSec World Forum
We are delighted to announce that digital ethics campaigner and global cybersecurity expert, Bill Mew will speak at PrivSec World Forum next month.
-
FeatureDon’t miss the editor’s top five sessions at PrivSec World Forum
With two weeks to go to PrivSec World Forum, event editor and research director, Robert Bateman shares his top five sessions to look out for.









