Latest Resources – Page 85
-
ebook
Ransomware Protection with Pure Storage and Commvault
Ransomware attacks continue to be top of mind for business and IT leaders. And for good reason.
-
ebook
Discovery-In-Depth, The Path to Data Intelligence
Privacy-centric data discovery (a must for data privacy and cybersecurity in today’s environment) requires a multi-pronged strategy to identify all types of sensitive & personal data in an organization – and that strategy starts with discovery-in-depth.
-
ebook
The Six Foundations of Data Privacy Regulation
The six most commonly discussed data protection regulations are the European Union’s GDPR, the California Consumer Privacy Act (CCPA) and Health Insurance Portability and Accountability Act (HIPAA) in the United States, Brazil’s LGPD, Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) and the Australian Data Privacy Law.
-
ebook
The Habits of Highly Data-Secure Companies
New IDG survey reveals three technologies that are helping enterprises build immunity to data breaches, in and out of the cloud.
-
ebook
The State of Email Security 2020
Global business is interspersed with a diversity of industrial sectors, united by a single, common communication thread that is key to any business: email connectivity.
-
News
Norwegian Parliament in Cyber Attack
Norway’s parliament reported a cyber attack to police on 1 September which hacked the accounts of a number of MPs and members of staff.
-
ebook
The Practical Executive’s Guide To Data Loss Prevention
There has been much confusion in the marketplace regarding data loss prevention (DLP) controls.
-
Feature
The Great Digital Disruption: Adjusting to a New Normal in Cybersecurity
COVID-19 has forced societies, governments, businesses and individuals to suddenly rethink long-held practices and processes. This includes fundamental aspects of our lives, such as how and where we work, teach, learn, live and interact.
-
Feature
The Risks of Checkbox Compliance
A key principle of the GDPR is that personal data must be processed securely, using “appropriate technical and organisational measures” – the “security principle”. To meet this principle, organisations implement a variety of IT security technologies, all aimed at protecting information where it is stored and processed.
-
Webinar
Successfully Managing Data Processors to Comply with GDPR
There are several considerations that need addressing beforeyou decide which data processors offer the most appropriate services for yourorganisation’s needs.
-
Webinar
Cyber AI: Supporting Privacy-First Security & Data Compliance
Data privacy is critical in increasingly digitized business environments, where the workforce is dispersed and dynamic, and relies on collaboration platforms, smart devices, and cloud computing.
-
Webinar
Solving Your Number One Security Risk
Email has played a growing role in digital transformation during the COVID-19 pandemic, as organisations continue to support large-scale remote working. But it has also introduced risk of accidental and intentional data leakage.
-
News
Uber former security chief charged in connection with attempted data breach cover-up
The US Department of Justice has charged Joseph Sullivan, former chief security officer at Uber, with obstruction of justice following a data breach.
-
Article
4,500 successful daily cyber attacks on UK SMEs
An estimated 65,000 attacks are carried out on UK SMEs every day resulting in 4,500 breaches, a report has highlighted.
-
Webinar
Prevent Costly Breaches in a Safe and Compliant Way
With so many communications exchanged daily, it’s not a question of whether a mistake will occur, but how often.
-
Webinar
Lessons Learnt from Recent Data Protection Enforcement Actions
It has now been over 2 years since GDPR came into effect. As most will now know, these regulations have dramatically increased the onus on organisations to take a proactive approach to data protection compliance and reduce risk around the way they handle data.
-
Webinar
Match Your Data Management Strategy to Your Disappearing Data Centre
Transformation in 2020 is on everyone’s mind. We had to enable our “suddenly remote” workforce, but without data resilience, control and visibility it is easy to get ahead of your organization’s capabilities to manage it.
-
ebook
How to strengthen information security with data discovery
Today, every company is a data company. Every business, no matter which sector it claims to be in, is producing extraordinary amounts of data which is growing in size every day. We are all operating in the information age and data has become the most valuable commodity a business owns. There’s so much value locked away within it.
-
ebook
Improved Ransomware Recoverability with SafeMode on FlashBlade
One of the biggest challenges in the growing digital economy is the exponential rise in ransomware attacks. Consequences can be dire: pay perpetrators to (they claim) unencrypt your data, stumble with decryption tools, or gamble on recovering from backups. With millions of dollars spent annually to guard entry points ...
-
ebook
How Consumer Privacy is Reshaping the Retail & Ecommerce Landscape
With Europe’s GDPR and California’s CCPA now in effect, privacy laws are catching up to consumers’ already high expectations around data privacy and consumer experience.