Latest Resources – Page 84
-
Webinar
The Balancing Act: Productivity, Collaboration and Data Protection
Join Microsoft for a deep dive on how you can use intelligent and built-in solutions to identify, label and protect sensitive data without impeding collaboration, even in an environment of remote work. We will follow the journey of an organization as individual workers collaborate on a patent pending project ...
-
Feature
Ensuring security in the journey towards digital healthcare
There are more digital touchpoints in the healthcare systems we experience today than ever before.
-
News
Airbnb admits to ‘technical issue’ that resulted in exposure of users’ private messages
The internal leak exposed Airbnb hosts’ personally identifiable information (PII) to other users.
-
Webinar
Safely Unleash the Value of Sensitive Data in the Cloud
Organizations are leveraging the Cloud to maximise the value of data, consolidating it in data lakes and committing to analytics and machine learning initiatives to convert it into actionable insights. As analysts and data scientists have started working with these tools it has become clear that to provide accurate ...
-
Q&A
Facing up to the cyber security challenge
James Eaton-Lee, head of information security and data protection officer at Oxfam, discusses the cyber threats and challenges facing third sector organisations tackling poverty, equality and democratic disempowerment.
-
Feature
Preparing for the cybercrime challenge: tips from a former FBI agent
Few have witnessed the developments in cybercrime unfold over the past 20 years as closely as Jeff Lanza. The former FBI agent has followed the progression of white-collar crime since the 1980s and has seen first-hand how investigations went from being all about catching gangsters operating in the physical world, to catching online hackers in just a matter of years.
-
News
Zerologon vulnerability actively exploited, says Microsoft
Microsoft has observed attacks exploiting the serious security flaw dubbed “Zerologon”, the company’s security intelligence team reported in a tweet yesterday.
-
ebook
Annulment of Privacy Shield – What Comes Next?
In striking down Privacy Shield, EU judges instantly threw into doubt the operations of more than 5,000 US companies that relied on it.
-
ebook
How Businesses Can Meet CCPA Compliance Requirements
The California Consumer Privacy Act (CCPA) is a California state statute intended to enhance California residents’ privacy rights.
-
Webinar
The Legal GRC Landscape Today, and Tomorrow
According to Exterro’s recent 2020 Corporate Legal Leaders Survey, 7-in-10 Legal Departments are managing their data related problems by sharing technology to manage litigation, data privacy, compliance, and cybersecurity – all of which represent a new encompassing business landscape of Legal GRC (Governance, Risk and Compliance).
-
Feature
Three things to consider when securing multi-cloud environments
Public sector organisations are all at different points on the cloud transformation and digitalisation journey.
-
Webinar
How to align infosec, data governance and employees to deliver stronger data governance and security
Getting a grip on unstructured data causes headaches because it’s so hard to get visibility of - and you simply can’t secure what you don’t know you’ve got.
-
ebook
Mid-Year CCPA Trends Report 2020
Now that the July 1st enforcement date for the California Consumer Privacy Act (CCPA) has come and gone, the question on every business’s mind is, “How many Data Subject Requests (DSRs) should I expect to receive?”
-
Q&A
James Eaton-Lee, Head of Information Security and Data Protection Officer, Oxfam
Ahead of this week’s Data Protection World Forum webinar, Building Security’s Influence in the C Suite, PrivSec catches up with Oxfam’s James Eaton-Lee.
-
Feature
Security: more than just “tech”
Ahead of this week’s Data Protection World Forum webinar, Building Security’s Influence in the C Suite, independent cyber security consultant Dr Emma Osborn highlights the importance of owning cyber risk at board level.
-
News
Cyber attack linked to death of woman at hacked German hospital
A woman has died in Germany after a cyber attack at the Düsseldorf University Clinic (DUC) caused her to be turned away for emergency medical treatment at the hospital earlier in September.
-
Webinar
A New and Critical Approach To Protecting Your Data
Most cybersecurity protections are based on looking for, finding, and stopping threats.
-
Feature
Don’t Lift and Shift: Evolve
At July’s Last Thursday in Privacy event, Sian John MBE, Microsoft’s EMEA / APJ director of cybersecurity strategy, gave companies transitioning to a cloud service model some food for thought. PrivSec’s Catherine Wycherley caught up with her to get some further insight.
-
-
News
A new role for the cybersecurity industry: Business Information Security Officer
Traditionally, those working in the cybersecurity industry have been technically savvy and laser-focused on tools and solutions. At a time when the whole enterprise – all its data and all its people – were safely housed in a corporate office and on the corporate network, this worked fine.