Latest Resources – Page 82
-
News
Ticketmaster fined £1.25m over personal data breach
Ticketmaster has been fined £1.25m for failing to keep the personal data of millions of customers secure.
-
Feature
Securing APIs: Best practices for keeping your data and infrastructure safe
With the attack surface for APIs continually increasing, Debbie Walkowski outlines the potential risks and best practices for keeping APIs secure.
-
ebook
Nine reasons why security leaders need to re-evaluate email security
In September 2020 Gartner released an update of its Market Guide for Email Security.
-
Webinar
Overcoming Data Privacy’s Biggest Challenge: Data Retention
Addressing data retention is the surest way to mitigate risks and costs of a data breach.
-
Webinar
Many Ways to Defeat Multi-Factor Authentication
Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn’t!
-
Webinar
Cyber Security: Employee Awareness in the New Normal
Phishing attacks are often seen as the most damaging and most common threat facing businesses. More people are now working from home and for many, this has the new normal – as a result employees have an increased risk of being targeted.
-
Webinar
What ROI to expect from better consent & preference management?
In this session, you will discover different use cases of consent and preference management in retail, both physical and digital.
-
Article
Social housing provider Flagship Group suffers REvil ransomware attack
A provider of social housing based in the UK has suffered a ransomware attack by prolific phishing strain Sodinokibi, otherwise known as REvil.
-
Webinar
How to Find Your Biggest Governance, Security, and Privacy Risks
Over the last decade, data has become the driving force behind businesses, economies, and daily life.
-
Video
Microsoft Executive Q&A On Compliance and Risk Management
Join this executive Q&A by Microsoft where they will discuss compliance and risk management.
-
ebook
Four Technologies Combine To Protect You From Ransomware Attacks
As the ones responsible for recovering from outages, infrastructure and operations (I&O) pros have successfully managed recoveries from all failures but one: ransomware.
-
ebook
Tackling Data Security and Compliance Challenges
Three questions every CIO should ask about their data storage security.
-
Webinar
Crafting a solution to Schrems II: Is a permanent fix possible?
On July 16, the EU’s highest court once again delivered a bombshell data protection ruling by annulling the EU-US Privacy Shield.
-
ebook
Company-issued Computers: What are employees really doing with them?
Now more than ever, organizations are issuing computing devices – laptops, mobile phones, desktops – en masse to their staff. There was no choice, as in March a certain submicroscopic infectious agent arrived uninvited to obliterate 2020.
-
Q&A
Non-linearity, neurodiversity and the skills gap
A Q&A with UK Cyber Security Association founder Lisa Ventura
-
ebook
Ransomware Protection Buyer’s Guide
Ransomware impacts both big and small organizations across every industry.
-
Webinar
The Schrems II Decision: What it Means for Privacy Programs
On 16 July, the Court of Justice of the European Union released its much-anticipated decision in the Schrems II case, invalidating the US-EU Privacy Shield and providing clarity around Standard Contractual Clauses (SCCs).
-
Analysis
Trust, privacy and combatting crime: the tech behind Singapore’s facial recognition ID scheme
Singapore is to become the first government in the world to grant citizens access to services online using facial verification and UK-based provider iProov has won the contract. FinCrime Report speaks to the firm’s founder Andrew Bud about the technology and issues of privacy, anti-money laundering, security and trust.
-
Webinar
A Necessary Change in the Data Protection Mindset
It is time for a paradigm shift in security.
-
Report
Identifying, verifying and authenticating customers in banking
GRC World Forums looks at some of the identification and verification technologies currently being used to ensure privacy and security in an increasingly complex banking landscape while ensuring user experience remains positive.