Latest Resources – Page 81
-
Article
Zoom reveals improved security with 256-bit GCM encryption
Zoom Video Communications has revealed improved security enhancements with 256-bit GCM encryption.
-
ebook
Improving Cybersecurity for Remote Working: 13 Recommendations
What are the security implications of this abrupt change? And which cybersecurity best practices are most critical to make this abrupt change both seamless and secure?
-
ebook
Remote Work Security: Privacy and Cybersecurity Essentials
With the onset of Coronavirus, the issue of remote working has been pushed to the forefront for organizations globally.
-
Article
Lack of understanding of US CLOUD Act poses a security threat to UK Business Data
New research from cloud and hosting services provider, IONOS, has found that 44% of IT decision makers (DMs) in the UK don’t have a comprehensive understanding of the US CLOUD Act, ultimately putting their data at risk.
-
Article
Body temperature cameras fuse security with virus screening technology
Cybersecurity and visuals tech company, Platinum CCTV, has unveiled a new thermoptic cybersecurity camera designed to help screen individuals before they enter a facility, to guard against cyber threats and the spread of infectious diseases.
-
-
-
-
Podcast
Article 27: Appointing an EU Representative
Richard Merrygold discusses Article 27 and appointing an EU representative at PrivSec London 2020.
-
Podcast
Aisling Costello: Evolution of Blockchain
Aisling Costello discusses the evolution of blockchain at PrivSec London.
-
Podcast
Tash Whitaker & Rowenna Fielding: Health and Data Protection FAQs
Tash Whitaker and Rowenna Fielding discuss health and data protection at PrivSec London 2020.
-
Article
Ransomware families launch sites to publish stolen data
Numerous ransomware families are adopting the new tactic of leaking stolen data of non-paying victims.
-
Feature
Coronavirus quarantine and cybercrime
The increase and global spread of cybercrime is partly linked to the amount of people being online, the increase of devices being used by each one of us and to the amount of time we spend online.
-
ebook
CCPA Regulation Update
Access the full 28 page report written on behalf of Truyo by Dan Clarke, President at IntraEdge, and Jim Halpert, Partner at DLA Piper.
-
Podcast
Greg Van Der Gaast: How Information Security Kills Data Protection
Greg Van Der Gaast. discusses how information security kills data protection at PrivSec London.
-
Article
One in five Europeans have experienced identity theft fraud in the past two years
New research has found over half of Europeans have experienced at least one type of fraud in the last two years.
-
News
Lead generation company exposes over 110m records
Lead generation company, Leadhunter, has exposed and lost over 110 million records due to an unsecured database.
-
Feature
Battling the rise of the deepfakes
Deepfake videos are becoming commonplace. So much so that you may have come across one without realising. Today, over 15,000 deepfakes are reportedly lurking online.
-
ebook
The GDPR Maturity Framework That Helps A DPO
The major challenge with designing, implementing and complying with GDPR legislation is knowing what good looks like; how do you know when you’ve got there? What is best practice?
-
Article
Ireland ranked least vulnerable European country to cybercrime
Research reveals that the Netherlands is the most vulnerable European country to cybercrime.