Latest Resources – Page 83
-
News
UK releases details of Russian cyber attacks against Olympics and Paralympics
GRU, Russia’s military intelligence service, hacked officials and organisations involved in the planned 2020 Tokyo Olympic and Paralympic Games, the UK government has announced.
-
Webinar
Defining Privacy Success and the struggle to measure it
Most companies are years into their privacy programs, but still haven’t figured out part of the essentials: how to accurately measure the success and impact of the privacy team’s work.
-
Feature
Please mind the (cyber skills) gap
Amid the furore around a withdrawn UK government-backed cyber skills advertisement this week, Privsec Report takes a look at the messaging and what it says about cyber security recruitment.
-
Webinar
Defensible Data Retention: The Holy Grail of Mitigating Data Privacy Risks
Over-retention of data is a major data privacy risk. US and international regulations specifically require that companies ensure their retention standards are up-to-date and enforced, and that all obsolete records containing regulated sensitive data are disposed of promptly.
-
Feature
Compliance, cloud migration and securing the “new normal”
As remote working looks set to become the new normal, businesses need to ensure their corporate information and data protection is secure. In the first in a series of Covid-themed articles this week, Andy Beverley outlines some of the key considerations
-
Feature
COVID-19 FOCUS: Compliance, cloud migration and securing the “new normal”
As remote working looks set to become the new normal, businesses need to ensure their corporate information and data protection is secure. In the first in a series of Covid-themed articles this week, Andy Beverley outlines some of the key considerations.
-
News
Trickbot ransomware distributor taken offline following court order
An infamous botnet and distributor of ransomware has been taken offline following a US court order, Microsoft has said.
-
News
Former US security chief warns of increased cyber crime due to coronavirus
The former head of the US National Security Agency has warned that the coronavirus pandemic has significantly increased cyber risk, with companies likely to face a growing number of attacks.
-
Feature
Identifying, verifying and authenticating customers – which tech options will you go for?
Know Your Customer rules are tightening but bank customers increasingly want fast sign-up and quick banking. FinCrime Report looks at some of the identification and verification technologies currently being used to prevent fraud and money laundering in an increasingly complex landscape while ensuring user experience remains positive.
-
Webinar
Building an Insider Threat Program for your Organization
Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization.
-
Webinar
Scaling Data Governance in Line with Business Growth
Strong data governance involves getting the right people, processes and technologies in place that are needed to manage and protect the organisations data assets. It forms the basis for effective Legal GRC practices and makes the efficient use of trustworthy data possible.
-
-
Article
Police confirm sex crime victims’ data leaked by Greater Manchester Police in test gone wrong
Highly sensitive data including the names and addresses of thousands of victims was accidentally leaked by Greater Manchester Police (GMP), police confirm.
-
Webinar
The Glass House: anonymity and data exposure in an AI world
All organizations live in a Glass House. From ISP’s to content delivery networks to website advertising, all commercial internet activity is being tracked, collected and monetized by a highly-automated data broker marketplace.
-
Webinar
Navigating Global Privacy Laws Along the IT Asset Lifecycle
As if cyberthreats weren’t enough, consumer privacy laws have put increased pressure on IT leaders to keep personal or sensitive data from being breached. This includes mandates to immediately and thoroughly respond to data deletion requests, data retention expirations, and other cases of no-longer-needed data across your entire data ...
-
Webinar
The Balancing Act: Productivity, Collaboration and Data Protection
Join Microsoft for a deep dive on how you can use intelligent and built-in solutions to identify, label and protect sensitive data without impeding collaboration, even in an environment of remote work. We will follow the journey of an organization as individual workers collaborate on a patent pending project ...
-
Feature
Ensuring security in the journey towards digital healthcare
There are more digital touchpoints in the healthcare systems we experience today than ever before.
-
News
Airbnb admits to ‘technical issue’ that resulted in exposure of users’ private messages
The internal leak exposed Airbnb hosts’ personally identifiable information (PII) to other users.
-
Webinar
Safely Unleash the Value of Sensitive Data in the Cloud
Organizations are leveraging the Cloud to maximise the value of data, consolidating it in data lakes and committing to analytics and machine learning initiatives to convert it into actionable insights. As analysts and data scientists have started working with these tools it has become clear that to provide accurate ...
-
Q&A
Facing up to the cyber security challenge
James Eaton-Lee, head of information security and data protection officer at Oxfam, discusses the cyber threats and challenges facing third sector organisations tackling poverty, equality and democratic disempowerment.