Latest Resources – Page 73
-
ebook
Tackling Data Security and Compliance Challenges
Three questions every CIO should ask about their data storage security.
-
ebook
Company-issued Computers: What are employees really doing with them?
Now more than ever, organizations are issuing computing devices – laptops, mobile phones, desktops – en masse to their staff. There was no choice, as in March a certain submicroscopic infectious agent arrived uninvited to obliterate 2020.
-
Q&A
Non-linearity, neurodiversity and the skills gap
A Q&A with UK Cyber Security Association founder Lisa Ventura
-
ebook
Ransomware Protection Buyer’s Guide
Ransomware impacts both big and small organizations across every industry.
-
Analysis
Trust, privacy and combatting crime: the tech behind Singapore’s facial recognition ID scheme
Singapore is to become the first government in the world to grant citizens access to services online using facial verification and UK-based provider iProov has won the contract. FinCrime Report speaks to the firm’s founder Andrew Bud about the technology and issues of privacy, anti-money laundering, security and trust.
-
Report
Identifying, verifying and authenticating customers in banking
GRC World Forums looks at some of the identification and verification technologies currently being used to ensure privacy and security in an increasingly complex banking landscape while ensuring user experience remains positive.
-
News
UK releases details of Russian cyber attacks against Olympics and Paralympics
GRU, Russia’s military intelligence service, hacked officials and organisations involved in the planned 2020 Tokyo Olympic and Paralympic Games, the UK government has announced.
-
Feature
Please mind the (cyber skills) gap
Amid the furore around a withdrawn UK government-backed cyber skills advertisement this week, Privsec Report takes a look at the messaging and what it says about cyber security recruitment.
-
Feature
Compliance, cloud migration and securing the “new normal”
As remote working looks set to become the new normal, businesses need to ensure their corporate information and data protection is secure. In the first in a series of Covid-themed articles this week, Andy Beverley outlines some of the key considerations
-
Feature
COVID-19 FOCUS: Compliance, cloud migration and securing the “new normal”
As remote working looks set to become the new normal, businesses need to ensure their corporate information and data protection is secure. In the first in a series of Covid-themed articles this week, Andy Beverley outlines some of the key considerations.
-
News
Trickbot ransomware distributor taken offline following court order
An infamous botnet and distributor of ransomware has been taken offline following a US court order, Microsoft has said.
-
News
Former US security chief warns of increased cyber crime due to coronavirus
The former head of the US National Security Agency has warned that the coronavirus pandemic has significantly increased cyber risk, with companies likely to face a growing number of attacks.
-
Feature
Identifying, verifying and authenticating customers – which tech options will you go for?
Know Your Customer rules are tightening but bank customers increasingly want fast sign-up and quick banking. FinCrime Report looks at some of the identification and verification technologies currently being used to prevent fraud and money laundering in an increasingly complex landscape while ensuring user experience remains positive.
-
-
Article
Police confirm sex crime victims’ data leaked by Greater Manchester Police in test gone wrong
Highly sensitive data including the names and addresses of thousands of victims was accidentally leaked by Greater Manchester Police (GMP), police confirm.
-
Feature
Ensuring security in the journey towards digital healthcare
There are more digital touchpoints in the healthcare systems we experience today than ever before.
-
News
Airbnb admits to ‘technical issue’ that resulted in exposure of users’ private messages
The internal leak exposed Airbnb hosts’ personally identifiable information (PII) to other users.
-
Q&A
Facing up to the cyber security challenge
James Eaton-Lee, head of information security and data protection officer at Oxfam, discusses the cyber threats and challenges facing third sector organisations tackling poverty, equality and democratic disempowerment.
-
Feature
Preparing for the cybercrime challenge: tips from a former FBI agent
Few have witnessed the developments in cybercrime unfold over the past 20 years as closely as Jeff Lanza. The former FBI agent has followed the progression of white-collar crime since the 1980s and has seen first-hand how investigations went from being all about catching gangsters operating in the physical world, to catching online hackers in just a matter of years.
-
News
Zerologon vulnerability actively exploited, says Microsoft
Microsoft has observed attacks exploiting the serious security flaw dubbed “Zerologon”, the company’s security intelligence team reported in a tweet yesterday.