Most Popular Content – Page 132
-
VideoProtecting privacy and ensuring data flows
How do companies leverage data flows to conduct everyday operations?
-
VideoGetting to grips with increased data management complexity in a post-Pandemic world
In an age of unprecedented change and complexity, managing data complexity is easier this is easier said than done.
-
VideoData lifecycle management challenges
One of the main challenges faced by companies involves adequately managing the information at hand, which is essential when making the right decisions.
-
VideoImplementing an Effective Operating Model to Ensure Organisational Alignment to Continuously Improve IAM Services
A fundamental mistake for organisations when handling security needs is performing individual, one-off projects to address IAM concerns. Individual projects often lack centralised leadership and provide only temporary solutions to the issue at hand.
-
VideoTrust but apply ZERO TRUST
Many organizations struggle with digital transformation, hybrid workforces and cloud computing particularly when implementing a framework to meet their compliance requirements.
-
VideoRansomware Jail. Is There Any Way Out?
Tired of seeing non-stop ransomware news and trying to understand how it got to this point?
-
VideoBuilding an effective security strategy for privacy
Information, data privacy and security concerns are a persistent trend and central to all too many political and ethical scandals, data privacy has become one of the defining social and cultural issues today.
-
VideoReconciling Bring Your Own Device (BYOD) with the Corporate Network
To manage or not to manage—there really is no choice between the two for today’s enterprises. Employees, contractors, partners, and others are bringing in personal devices and connecting to the corporate network for professional and personal reasons.
-
VideoOutlining Effective Performance metrics provide transaction-level reporting to measure efficiency of services and projects
Many organisations lack defined metrics that report on the status and maturity of an IAM environment, such as enterprise service usage and enterprise control objective compliance.
-
VideoMeeting Identity and Access Management Challenges in the Era of Mobile and Cloud
Organisations are flocking to cloud services and mobile devices to cut costs and boost productivity.
-
VideoGetting to grips with the very real threat of modern ransomware and its impact on organisations
Infrastructure and operations leaders responsible for data protection must evaluate new ransomware protection features as critical prerequisites when choosing backup platforms.
-
VideoData Management and Protection as a Service (DPaaS) to improve business continuity within your organisation
According to a report published by Transparency Market Research, the market for Data Protection as a Service (DPaaS) is expected to reach $46 billion by 2024.
-
VideoShaping the Future of Data Privacy Globally
A look at compliance challenges faced by globally-data driven businesses relying on international data transfers.
-
VideoCodes of conduct: Preparation, compliance and enforcement, with OneTrust
Codes of conduct are not a new concept, but have been a comparatively rarely used mechanism in the European privacy landscape.
-
NewsCyberstrikes on Ukraine increase as Russia invades
Malicious software has been found hitting computers and IT systems in Ukraine, in a wave of hacks that experts say is likely to originate from Russia.
-
NewsBritish businesses warned of increased cyber warfare risk as Russian tanks roll into Ukraine
Following the escalation in the conflict in western Ukraine, the Russian government and their proxies are using numerous new methods to attack.
-
NewsRussia sanctions put US banks on high alert for cyberattack
Banks in the US are bracing themselves against a potential wave of cyberattacks as the West intensifies sanctions leveraged against Russia following of its invasion of Ukraine, cyber experts say.
-
NewsNew laws created to hit Russian money-laundering
The UK government is speeding up the creation of laws designed hit the money-laundering activities of overseas oligarchs, following Russia’s invasion of Ukraine.
-
-









