More from Information Security – Page 46
-
FeatureIdentifying, verifying and authenticating customers in banking
PrivSec Report looks at some of the identification and verification technologies currently being used to ensure privacy and security in an increasingly complex banking landscape while ensuring user experience remains positive.
-
NewsHalf of large companies to adopt privacy-enhancing computation by 2025
Half of large organisations will implement privacy-enhancing computation for processing data in untrusted environments within five years, Gartner has predicted.
-
NewsUK releases details of Russian cyber attacks against Olympics and Paralympics
GRU, Russia’s military intelligence service, hacked officials and organisations involved in the planned 2020 Tokyo Olympic and Paralympic Games, the UK government has announced.
-
NewsIAB Europe warns of ‘chilling effect’ on open-source compliance solutions if GDPR breach interpretation upheld
Digital advertising association IAB Europe has hit out at a preliminary report by the Belgian Data Protection Authority finding that its ad tracking consent framework does not comply with GDPR.
-
NewsBritish Airways fined £20m over data breach
The Information Commissioner’s Office (ICO) has fined British Airways (BA) £20m for failing to protect the personal and financial details of more than 400,000 of its customers.
-
FeatureCOVID-19 FOCUS: Contact tracing in Ireland
As countries across the world grapple with tracking the virus while protecting data and privacy, Ireland’s contact tracing app has had a better reception than most. PrivSec Report looks at the Irish app’s development and privacy journey.
-
FeaturePlease mind the (cyber skills) gap
Amid the furore around a withdrawn UK government-backed cyber skills advertisement this week, Privsec Report takes a look at the messaging and what it says about cyber security recruitment.
-
WebinarDefensible Data Retention: The Holy Grail of Mitigating Data Privacy Risks
Over-retention of data is a major data privacy risk. US and international regulations specifically require that companies ensure their retention standards are up-to-date and enforced, and that all obsolete records containing regulated sensitive data are disposed of promptly.
-
NewsICO probes Klarna after newsletter emailed to customers in error
The Information Commissioner’s Office (ICO) in the UK is probing an incident in which payment service provider Klarna sent an email to customers who had not opted in to receive it.
-
NewsTrickbot ransomware distributor taken offline following court order
An infamous botnet and distributor of ransomware has been taken offline following a US court order, Microsoft has said.
-
NewsEnd-to-end encryption could pose threat to children, warns US, UK, Australia, New Zealand, Canada, India and Japan
Certain uses of encryption technology pose challenges to public safety, including to highly vulnerable members of society such as sexually exploited children, according to a statement issued earlier this week by the United States Department of Justice and signed by six other nations.
-
WebinarBuilding an Insider Threat Program for your Organization
Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization.
-
NewsEuropean privacy laws to blame for continued self-harm content, says Instagram
Content that breaks Instagram’s own rules on promoting and glamourising eating disorders and self-injury can still be found on the platform, an investigation has revealed.
-
NewsDon’t take you eye off insider cybercrime threats. Register for our free webinar
Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization.
-
WebinarSafely Unleash the Value of Sensitive Data in the Cloud
Organizations are leveraging the Cloud to maximise the value of data, consolidating it in data lakes and committing to analytics and machine learning initiatives to convert it into actionable insights. As analysts and data scientists have started working with these tools it has become clear that to provide accurate insights, ...
-
NewsZerologon vulnerability actively exploited, says Microsoft
Microsoft has observed attacks exploiting the serious security flaw dubbed “Zerologon”, the company’s security intelligence team reported in a tweet yesterday.
-
ebookRansomware Protection with Pure Storage and Commvault
Ransomware attacks continue to be top of mind for business and IT leaders. And for good reason.
-
ebookThe State of Email Security 2020
Global business is interspersed with a diversity of industrial sectors, united by a single, common communication thread that is key to any business: email connectivity.
-
NewsNorwegian Parliament in Cyber Attack
Norway’s parliament reported a cyber attack to police on 1 September which hacked the accounts of a number of MPs and members of staff.
-
NewsFirm announces new data privacy function for public blockchains
Secret Network has announced it is launching a new secret contract function “to bring privacy to public blockchains”



