All Security articles – Page 23
-
Video
Data Protection and Security in the Cloud
As the cloud environment continues to develop and new mechanisms are introduced which affect organisations’ strategies, opportunities and risks grow in complexity.
-
Video
Disposing of Data Securely & Completely in a Post-Covid World
Drawing on industry research, best practices and case studies, we’ll explore why enterprises must address end-of-life data more efficiently and precisely than ever before.
-
Video
Building a Risk Management Framework for the Future
Managing risk is at the heart of any data protection programme and building a strategy which can navigate changes in market and business strategy is crucial.
-
Video
Identifying Risky Vendors: 7 Warning Signs You Shouldn’t Ignore
For individuals managing third-party risk, there is one primary question that needs answering: Are your vendors safe to do business with?
-
Video
Using Security as a Tool to Build Competitive Edge
Security functions in some leading organisations are beginning to move beyond just their role as defence mechanism and are defining the role they can play in contributing to the overall strategic vision.
-
Video
Embedding Security and Risk Management into Your Organisation
Cyber security plays a critical role in helping digital businesses to flourish.
-
Video
Jeff Lanza on Cybercrime: Strategies to Prevent, Protect and Prevail
From computer intrusions to ransomware, a 20-year veteran FBI special agent and cyber security expert traces the evolution of the cybercrime “pandemic” and provides countermeasures to combat the global threat.
-
Video
Engaging the board: How your board can be ready for crisis
Engaging the board is an ongoing challenge in cyber security for a variety of reasons: what seems like a uniquely technical issue is actually a complex business risk present across different business functions.
-
Video
Best Practice for Incident Response
Effective incident response is a key component of being able to contain and respond to a breach.
-
Video
Building Your Security Dream Team
How can you guarantee that your security team has the right skills and resources to implement your cyber security plan?
-
Video
The Evolving Security Landscape - Trends to Expect in 2021 and Beyond
What is the current state of cybercrime and what are the common types of incidents being reported?
-
Feature
Secure foundations: an interview with Zoë Rose
PrivSec Global speaker Zoë Rose talks us through her journey into cyber security and her thoughts on common enterprise mistakes.
-
ebook
Rethinking Data Protection: The Human-centric Approach
The truth about traditional data security. Traditional cybersecurity was hinged on event-centric responses: Build a wall at the perimeter, control what passes in and out through that wall, and respond when something suspicious happens.
-
News
Trump fires CISA Director over statement on US election security
The Director of the Cybersecurity and Infrastructure Security Agency (CISA) was fired by Donald Trump yesterday because he authorised a statement saying that the election was “the most secure in American history.”
-
News
Ticketmaster fined £1.25m over personal data breach
Ticketmaster has been fined £1.25m for failing to keep the personal data of millions of customers secure.
-
Feature
Securing APIs: Best practices for keeping your data and infrastructure safe
With the attack surface for APIs continually increasing, Debbie Walkowski outlines the potential risks and best practices for keeping APIs secure.
-
ebook
Nine reasons why security leaders need to re-evaluate email security
In September 2020 Gartner released an update of its Market Guide for Email Security.
-
Webinar
Cyber Security: Employee Awareness in the New Normal
Phishing attacks are often seen as the most damaging and most common threat facing businesses. More people are now working from home and for many, this has the new normal – as a result employees have an increased risk of being targeted.
-
Article
Social housing provider Flagship Group suffers REvil ransomware attack
A provider of social housing based in the UK has suffered a ransomware attack by prolific phishing strain Sodinokibi, otherwise known as REvil.
-
ebook
Four Technologies Combine To Protect You From Ransomware Attacks
As the ones responsible for recovering from outages, infrastructure and operations (I&O) pros have successfully managed recoveries from all failures but one: ransomware.