More from Information Security – Page 45
-
-
-
VideoWhy It’s Time to Rethink Your Approach to Data Classification
How can enterprises know their data in a fragmented data landscape of diverse data formats, schemas, content, and metadata types? Why haven’t we solved the classification conundrum - and how can security and privacy teams lead the charge for next-generation classification?
-
VideoThe Zero Trust Model - Securing Your Sensitive Data
Speaker Panel The Zero Trust Model - Securing Your Sensitive Data Video: The Zero Trust Model - Securing You…
-
NewsRansomware attack halts classes for 115,000 pupils in Maryland, US
A ransomware attack on a school district in Maryland, US, has halted classes for a reported 115,000 pupils.
-
NewsFrench food retail giant Carrefour fined €3m for GDPR breaches
The French multinational retailer Carrefour has been fined €3m for multiple data protection failings.
-
AnalysisProtecting data security during digital transformation
As organisations embrace the distributed workforce and become “Everywhere Enterprises”, digital transformation needs to go hand in hand with data security, says Brian Foster.
-
VideoProtect sensitive data in Microsoft Teams with Microsoft DLP
Join this session with Microsoft where they will discuss protecting sensitive data in Microsoft Teams with Microsoft DLP.
-
ebookNine reasons why security leaders need to re-evaluate email security
In September 2020 Gartner released an update of its Market Guide for Email Security.
-
NewsThe FTC settles with Zoom after the company ‘misled’ users over encryption and surveillance
The Federal Trade Commission (FTC) has announced a settlement with Zoom, after the company “misled users by touting that it offered ‘end-to-end, 256-bit encryption’ and remote video surveillance.”
-
WebinarCyber Security: Employee Awareness in the New Normal
Phishing attacks are often seen as the most damaging and most common threat facing businesses. More people are now working from home and for many, this has the new normal – as a result employees have an increased risk of being targeted.
-
NewsTwitter inches closer to first cross-border GDPR penalty
Twitter is inching closer to becoming the subject of the Irish Data Protection Commission’s first major cross-border GDPR decision.
-
ArticleSocial housing provider Flagship Group suffers REvil ransomware attack
A provider of social housing based in the UK has suffered a ransomware attack by prolific phishing strain Sodinokibi, otherwise known as REvil.
-
NewsTim Berners-Lee launches enterprise-friendly decentralised web platform in move to ‘restore power on the web’
Tim Berners-Lee has launched an enterprise-friendly decentralised web platform using the open-source technology, Solid, to “restore power” on the web.
-
NewsLegal action brought against ICO over alleged Adtech GDPR breaches
UK privacy campaigners The Open Rights Group (ORG) yesterday announced their intention to bring legal action against the UK data protection regulator.
-
ebookFour Technologies Combine To Protect You From Ransomware Attacks
As the ones responsible for recovering from outages, infrastructure and operations (I&O) pros have successfully managed recoveries from all failures but one: ransomware.
-
NewsFBI has ‘credible information’ that cyber attackers are targeting US hospitals
US hospitals and health care providers are facing an “increased and imminent” cybercrime threat, the Federal Bureau and Investigation (FBI) and two other federal agencies have warned.
-
NewsUber faces landmark GDPR court challenge over alleged firing of drivers by algorithm
A trade union on Monday filed a complaint in the Amsterdam District Court accusing Uber of “robo-firing” drivers by algorithm
-
ebookRansomware Protection Buyer’s Guide
Ransomware impacts both big and small organizations across every industry.
-
ArticleBharti Airtel blames controversial privacy policy wording on a ‘clerical error’
Indian telecommunications company Bharti Airtel says a clerical error led to a discrepancy in its privacy policy, which stated the company shared personal information including genetic data with third parties.



