Latest Resources – Page 83
-
ebook
Ransomware Protection Buyer’s Guide
Ransomware impacts both big and small organizations across every industry.
-
Webinar
The Schrems II Decision: What it Means for Privacy Programs
On 16 July, the Court of Justice of the European Union released its much-anticipated decision in the Schrems II case, invalidating the US-EU Privacy Shield and providing clarity around Standard Contractual Clauses (SCCs).
-
Analysis
Trust, privacy and combatting crime: the tech behind Singapore’s facial recognition ID scheme
Singapore is to become the first government in the world to grant citizens access to services online using facial verification and UK-based provider iProov has won the contract. FinCrime Report speaks to the firm’s founder Andrew Bud about the technology and issues of privacy, anti-money laundering, security and trust.
-
Webinar
A Necessary Change in the Data Protection Mindset
It is time for a paradigm shift in security.
-
Report
Identifying, verifying and authenticating customers in banking
GRC World Forums looks at some of the identification and verification technologies currently being used to ensure privacy and security in an increasingly complex banking landscape while ensuring user experience remains positive.
-
News
UK releases details of Russian cyber attacks against Olympics and Paralympics
GRU, Russia’s military intelligence service, hacked officials and organisations involved in the planned 2020 Tokyo Olympic and Paralympic Games, the UK government has announced.
-
Webinar
Defining Privacy Success and the struggle to measure it
Most companies are years into their privacy programs, but still haven’t figured out part of the essentials: how to accurately measure the success and impact of the privacy team’s work.
-
Feature
Please mind the (cyber skills) gap
Amid the furore around a withdrawn UK government-backed cyber skills advertisement this week, Privsec Report takes a look at the messaging and what it says about cyber security recruitment.
-
Webinar
Defensible Data Retention: The Holy Grail of Mitigating Data Privacy Risks
Over-retention of data is a major data privacy risk. US and international regulations specifically require that companies ensure their retention standards are up-to-date and enforced, and that all obsolete records containing regulated sensitive data are disposed of promptly.
-
Feature
Compliance, cloud migration and securing the “new normal”
As remote working looks set to become the new normal, businesses need to ensure their corporate information and data protection is secure. In the first in a series of Covid-themed articles this week, Andy Beverley outlines some of the key considerations
-
Feature
COVID-19 FOCUS: Compliance, cloud migration and securing the “new normal”
As remote working looks set to become the new normal, businesses need to ensure their corporate information and data protection is secure. In the first in a series of Covid-themed articles this week, Andy Beverley outlines some of the key considerations.
-
News
Trickbot ransomware distributor taken offline following court order
An infamous botnet and distributor of ransomware has been taken offline following a US court order, Microsoft has said.
-
News
Former US security chief warns of increased cyber crime due to coronavirus
The former head of the US National Security Agency has warned that the coronavirus pandemic has significantly increased cyber risk, with companies likely to face a growing number of attacks.
-
Feature
Identifying, verifying and authenticating customers – which tech options will you go for?
Know Your Customer rules are tightening but bank customers increasingly want fast sign-up and quick banking. FinCrime Report looks at some of the identification and verification technologies currently being used to prevent fraud and money laundering in an increasingly complex landscape while ensuring user experience remains positive.
-
Webinar
Building an Insider Threat Program for your Organization
Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization.
-
Webinar
Scaling Data Governance in Line with Business Growth
Strong data governance involves getting the right people, processes and technologies in place that are needed to manage and protect the organisations data assets. It forms the basis for effective Legal GRC practices and makes the efficient use of trustworthy data possible.
-
-
Article
Police confirm sex crime victims’ data leaked by Greater Manchester Police in test gone wrong
Highly sensitive data including the names and addresses of thousands of victims was accidentally leaked by Greater Manchester Police (GMP), police confirm.
-
Webinar
The Glass House: anonymity and data exposure in an AI world
All organizations live in a Glass House. From ISP’s to content delivery networks to website advertising, all commercial internet activity is being tracked, collected and monetized by a highly-automated data broker marketplace.
-
Webinar
Navigating Global Privacy Laws Along the IT Asset Lifecycle
As if cyberthreats weren’t enough, consumer privacy laws have put increased pressure on IT leaders to keep personal or sensitive data from being breached. This includes mandates to immediately and thoroughly respond to data deletion requests, data retention expirations, and other cases of no-longer-needed data across your entire data ...