Latest Resources – Page 85
-
News
Hackers turn hunted in new AI-based cyber security deception tool
The University of Strathclyde has announced that researchers at its Centre for Intelligent and Dynamic Communications are working on a cyber security solution that uses AI and deception to protect network systems.
-
News
China announces global security standards initiative
China announced on Tuesday that it will launch an initiative to promote global data security in this area, Global Times reported.
-
Webinar
How to Make Privacy Training Stick
Privacy training shouldn’t be doomed to guesswork and low engagement.
-
Webinar
Data Privacy by Design for the Insurance Sector
Insurance is a heavily regulated sector that deals with large amounts of sensitive customer information as a core component of the business.
-
Webinar
Coping with Turbulence: Managing Cross-Border Data Transfers
There’s now more pressure than ever for managing data flows across jurisdictions, governing third party data sharing and enforcing data residency requirements.
-
ebook
Ransomware Protection with Pure Storage and Commvault
Ransomware attacks continue to be top of mind for business and IT leaders. And for good reason.
-
ebook
Discovery-In-Depth, The Path to Data Intelligence
Privacy-centric data discovery (a must for data privacy and cybersecurity in today’s environment) requires a multi-pronged strategy to identify all types of sensitive & personal data in an organization – and that strategy starts with discovery-in-depth.
-
ebook
The Six Foundations of Data Privacy Regulation
The six most commonly discussed data protection regulations are the European Union’s GDPR, the California Consumer Privacy Act (CCPA) and Health Insurance Portability and Accountability Act (HIPAA) in the United States, Brazil’s LGPD, Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) and the Australian Data Privacy Law.
-
ebook
The Habits of Highly Data-Secure Companies
New IDG survey reveals three technologies that are helping enterprises build immunity to data breaches, in and out of the cloud.
-
ebook
The State of Email Security 2020
Global business is interspersed with a diversity of industrial sectors, united by a single, common communication thread that is key to any business: email connectivity.
-
News
Norwegian Parliament in Cyber Attack
Norway’s parliament reported a cyber attack to police on 1 September which hacked the accounts of a number of MPs and members of staff.
-
ebook
The Practical Executive’s Guide To Data Loss Prevention
There has been much confusion in the marketplace regarding data loss prevention (DLP) controls.
-
Feature
The Great Digital Disruption: Adjusting to a New Normal in Cybersecurity
COVID-19 has forced societies, governments, businesses and individuals to suddenly rethink long-held practices and processes. This includes fundamental aspects of our lives, such as how and where we work, teach, learn, live and interact.
-
Feature
The Risks of Checkbox Compliance
A key principle of the GDPR is that personal data must be processed securely, using “appropriate technical and organisational measures” – the “security principle”. To meet this principle, organisations implement a variety of IT security technologies, all aimed at protecting information where it is stored and processed.
-
Webinar
Successfully Managing Data Processors to Comply with GDPR
There are several considerations that need addressing beforeyou decide which data processors offer the most appropriate services for yourorganisation’s needs.
-
Webinar
Cyber AI: Supporting Privacy-First Security & Data Compliance
Data privacy is critical in increasingly digitized business environments, where the workforce is dispersed and dynamic, and relies on collaboration platforms, smart devices, and cloud computing.
-
Webinar
Solving Your Number One Security Risk
Email has played a growing role in digital transformation during the COVID-19 pandemic, as organisations continue to support large-scale remote working. But it has also introduced risk of accidental and intentional data leakage.
-
News
Uber former security chief charged in connection with attempted data breach cover-up
The US Department of Justice has charged Joseph Sullivan, former chief security officer at Uber, with obstruction of justice following a data breach.
-
Article
4,500 successful daily cyber attacks on UK SMEs
An estimated 65,000 attacks are carried out on UK SMEs every day resulting in 4,500 breaches, a report has highlighted.
-
Webinar
Prevent Costly Breaches in a Safe and Compliant Way
With so many communications exchanged daily, it’s not a question of whether a mistake will occur, but how often.