More from Information Security – Page 27
-
VideoGlobal Data Protection and Privacy Law Developments: UAE: How Data Protection Measures are Evolving and What the Future Holds
The UAE does not have a full federal data protection and privacy law, nor does it have a regulatory authority.
-
VideoExposed: Keeping Your Organization’s Sensitive Data Safe from Careless End Users
While data security is at the forefront for many IT and security teams, for most employees, security is an afterthought.
-
VideoEthics and Consent: Marketing and an Ethical Use of Data
CMOs need to think seriously about how and why they use data. But, while they harness the power of data, they must do so ethically - taking care of human values at the same time.
-
VideoPractical Ways to Operationalize Schrems II & International Data Transfers
The past 18 months have seen an increased focus on the regulation of international data transfers with the CJEU’s Schrems II decision driving updates from both the EDPB and European Commission.
-
VideoEurope’s Gamble on AI Regulations and what this means for Business
The proposed AI Regulation is a vast and ambitious law that attempts to both facilitate the use of AI across Europe and protect Europeans from its more harmful effects.
-
NewsUS to target cryptocurrency firms involved in ML
The US government is reportedly set to prepare an array of actions, including sanctions to deter cryptocurrency firms getting involved in ransomware and laundering.
-
NewsTwo South African government agencies hit in cyber-attacks
South Africa’s department of justice and constitutional development (DoJ) and the South African National Space Agency (Sansa) have been targeted by hackers.
-
SponsoredRansomware: when your data backup is your last line of defence, make it count
Not all data backups are created equal.
The cyber-threat landscape is ever evolving, and undoubtedly one of the biggest current threats is ransomware. Ransomware is a type of malicious software that threatens to publish the victim’s data, or perpetually block access to it, unless a ransom is paid. For modern organizations who rely on data to operate and thrive, this kind of attack can be catastrophic. A recent global report from Sophos found that the average cost of paying a ransom was $1.4 million, or $730,000 in equivalent loss of revenue owing to downtime should they choose not to. -
VideoBuilding an effective security strategy for privacy
Information, data privacy and security concerns are a persistent trend and central to all too many political and ethical scandals, data privacy has become one of the defining social and cultural issues today.
-
VideoData lifecycle management challenges
One of the main challenges faced by companies involves adequately managing the information at hand, which is essential when making the right decisions.
-
VideoShaping the Future of Data Privacy Globally
A look at compliance challenges faced by globally-data driven businesses relying on international data transfers.
-
VideoData Management and Protection as a Service (DPaaS) to improve business continuity within your organisation
According to a report published by Transparency Market Research, the market for Data Protection as a Service (DPaaS) is expected to reach $46 billion by 2024.
-
VideoGetting to grips with the very real threat of modern ransomware and its impact on organisations
Infrastructure and operations leaders responsible for data protection must evaluate new ransomware protection features as critical prerequisites when choosing backup platforms.
-
VideoRansomware Jail. Is There Any Way Out?
Tired of seeing non-stop ransomware news and trying to understand how it got to this point?
-
VideoGetting to grips with increased data management complexity in a post-Pandemic world
In an age of unprecedented change and complexity, managing data complexity is easier this is easier said than done.
-
VideoMeeting Identity and Access Management Challenges in the Era of Mobile and Cloud
Organisations are flocking to cloud services and mobile devices to cut costs and boost productivity.
-
VideoOutlining Effective Performance metrics provide transaction-level reporting to measure efficiency of services and projects
Many organisations lack defined metrics that report on the status and maturity of an IAM environment, such as enterprise service usage and enterprise control objective compliance.
-
VideoReconciling Bring Your Own Device (BYOD) with the Corporate Network
To manage or not to manage—there really is no choice between the two for today’s enterprises. Employees, contractors, partners, and others are bringing in personal devices and connecting to the corporate network for professional and personal reasons.
-
VideoImplementing an Effective Operating Model to Ensure Organisational Alignment to Continuously Improve IAM Services
A fundamental mistake for organisations when handling security needs is performing individual, one-off projects to address IAM concerns. Individual projects often lack centralised leadership and provide only temporary solutions to the issue at hand.
-
VideoTrust but apply ZERO TRUST
Many organizations struggle with digital transformation, hybrid workforces and cloud computing particularly when implementing a framework to meet their compliance requirements.


