More Protective Security Content – Page 19
-
VideoRecovering from a Breach: Back up, Recovery, Learnings and Best Practice
Unfortunately, data breaches are on the rise. Not only do they pose a threat to the reputation and finance of organisations large and small, but data loss can wipe out hours of productivity, costing the business even further.
-
VideoIvana Bartoletti in conversation with Joe Tidy
Ivana Bartoletti, Technical Director at Deloitte, and author of ‘An Artificial Revolution: On Power, Politics and AI’ will sit down BBC News, Cyber Security Correspondent, Joe Tidy for a virtual fireside chat to discuss Ivana’s book, and the current challenges and future of Artificial Intelligence.
-
ebookImproving Cybersecurity for Remote Working: 13 Recommendations
What are the security implications of this abrupt change? And which cybersecurity best practices are most critical to make this abrupt change both seamless and secure?
-
ebookRemote Work Security: Privacy and Cybersecurity Essentials
With the onset of Coronavirus, the issue of remote working has been pushed to the forefront for organizations globally.
-
ArticleBody temperature cameras fuse security with virus screening technology
Cybersecurity and visuals tech company, Platinum CCTV, has unveiled a new thermoptic cybersecurity camera designed to help screen individuals before they enter a facility, to guard against cyber threats and the spread of infectious diseases.
-
PodcastAisling Costello: Evolution of Blockchain
Aisling Costello discusses the evolution of blockchain at PrivSec London.
-
PodcastGreg Van Der Gaast: How Information Security Kills Data Protection
Greg Van Der Gaast. discusses how information security kills data protection at PrivSec London.
-
NewsHundreds of thousands of credit card details leaked online
Credit card details issued by banks from at least six Southeast Asian countries have been leaked online.
-
ArticleIreland ranked least vulnerable European country to cybercrime
Research reveals that the Netherlands is the most vulnerable European country to cybercrime.
-
NewsOnline eyewear stores exposes the data of 186K customers
A database containing 186,000 sales records and 40.4 million visitor IP addresses has been discovered online.
-
NewsVulnerability found within Cisco Webex and Zoom
Researchers have announced the discovery of a vulnerability within the video-conferencing platforms, Cisco Webex and Zoom, allowing attacks to snoop into calls.
-
ArticleIkea apologises for data breach
The homeware retailer, Ikea, has issued an apology to Singapore-based customers that may have been adversely impacted by a data breach the firm suffered.
-
ArticlePersonal data of TalkTalk breach victims discovered online
In 2015, news broke of a hack on TalkTalk, which compromised the personal data of 155,959 of the telecommunications firm’s customers, including 15,656 who had their bank details hacked.
-
NewsMcAfee, Symantec & Trend Micro breached by Russian hacking group
The three US-based antivirus software vendors that had been breached by a Russian hacking group have now been identified.
-
ArticleInadequate security sees surge in IoT data breaches, study shows
Research finds that the number of data breaches linked to Internet of Things (IoT) devices has increased considerably over the last two years.
-
Article‘Ethical’ hack compromises data of countless online shoppers
Hundreds of thousands of online shoppers have had their personal data exposed in a recent ‘ethical’ hack.
-
FeatureThe 7 elements of GDPR software security compliance
By now, you’re probably aware that the General Data Protection Regulation (GDPR) is coming. Taking effect on May 25, 2018, GDPR aims to unify the European Union (EU) on common data protection practices. Bringing more control and higher standards, this regulation will affect how firms gather, store, and use data pertaining to EU residents.
-
Feature10 ways cybersecurity will evolve in the next five years
Looking back just 10 years, the cyber threat landscape is almost unrecognisable. Back then most IT security threats were unsophisticated malware programs (mostly viruses, worms or trojans) written by people whose main aim was simply to cause trouble.
-
FeatureWhy communication is vital during a cyber-attack
Cyber-attacks are a constant threat to organisations. Cloud-based communications platforms can help an organisation improve emergency communications and recover from the effects of a cyber-attack.


