All Security Intelligence articles – Page 6
-
WebinarA New and Critical Approach To Protecting Your Data
Most cybersecurity protections are based on looking for, finding, and stopping threats.
-
FeatureDon’t Lift and Shift: Evolve
At July’s Last Thursday in Privacy event, Sian John MBE, Microsoft’s EMEA / APJ director of cybersecurity strategy, gave companies transitioning to a cloud service model some food for thought. PrivSec’s Catherine Wycherley caught up with her to get some further insight.
-
NewsA new role for the cybersecurity industry: Business Information Security Officer
Traditionally, those working in the cybersecurity industry have been technically savvy and laser-focused on tools and solutions. At a time when the whole enterprise – all its data and all its people – were safely housed in a corporate office and on the corporate network, this worked fine.
-
NewsHackers turn hunted in new AI-based cyber security deception tool
The University of Strathclyde has announced that researchers at its Centre for Intelligent and Dynamic Communications are working on a cyber security solution that uses AI and deception to protect network systems.
-
ebookThe Practical Executive’s Guide To Data Loss Prevention
There has been much confusion in the marketplace regarding data loss prevention (DLP) controls.
-
WebinarCyber AI: Supporting Privacy-First Security & Data Compliance
Data privacy is critical in increasingly digitized business environments, where the workforce is dispersed and dynamic, and relies on collaboration platforms, smart devices, and cloud computing.
-
WebinarPrevent Costly Breaches in a Safe and Compliant Way
With so many communications exchanged daily, it’s not a question of whether a mistake will occur, but how often.
-
ebookHow to strengthen information security with data discovery
Today, every company is a data company. Every business, no matter which sector it claims to be in, is producing extraordinary amounts of data which is growing in size every day. We are all operating in the information age and data has become the most valuable commodity a business owns. There’s so much value locked away within it.
-
ebookAchieve a dependable, secure and manageable multi-cloud
In the majority of organisations, the question of whether to embrace public cloud computing was never a simple choice between that and on-premises infrastructure.
-
NewsNew report reveals cyber security flaws in UK universities
More than half of UK universities have reported at least one data breach to the Information Commissioner’s Office (ICO) over the last year, according to a report from managed security services provider Redscan.
-
FeatureSecurity Concerns over Contact Tracing Apps
When an individual is found to be infected with the coronavirus, the race is on to find those who they have come into contact with, as these people could be carriers or even be infected. This has led to hundreds of coronavirus contact-tracing mobile applications being developed worldwide and backed by various governments and national health authorities, as well as guidelines by the EU and special protocols developed by the two major smartphone OS vendors Apple & Google. In some places, the usage of such applications has been made mandatory for people who want to gain access into public spaces.
-
FeatureArtificial Intelligence: addressing the risks to data privacy and beyond
As more companies are implementing Artificial Intelligence (AI) as a core part of their digital transformation, there is a requirement for boards to focus on the risks related to AI use of personal data and the potential bias and unpredictability in its output.
-
VideoStopping Email Data Breaches
People cause data breaches every day. Often, without meaning to and the vast majority while using corporate email accounts.
-
VideoRecovering from a Breach: Back up, Recovery, Learnings and Best Practice
Unfortunately, data breaches are on the rise. Not only do they pose a threat to the reputation and finance of organisations large and small, but data loss can wipe out hours of productivity, costing the business even further.
-
VideoIvana Bartoletti in conversation with Joe Tidy
Ivana Bartoletti, Technical Director at Deloitte, and author of ‘An Artificial Revolution: On Power, Politics and AI’ will sit down BBC News, Cyber Security Correspondent, Joe Tidy for a virtual fireside chat to discuss Ivana’s book, and the current challenges and future of Artificial Intelligence.
-
ebookRemote Work Security: Privacy and Cybersecurity Essentials
With the onset of Coronavirus, the issue of remote working has been pushed to the forefront for organizations globally.
-
ArticleBody temperature cameras fuse security with virus screening technology
Cybersecurity and visuals tech company, Platinum CCTV, has unveiled a new thermoptic cybersecurity camera designed to help screen individuals before they enter a facility, to guard against cyber threats and the spread of infectious diseases.
-
PodcastAisling Costello: Evolution of Blockchain
Aisling Costello discusses the evolution of blockchain at PrivSec London.
-
FeatureAddressing Privacy and Data Security Implications of the Coronavirus
COVID-19 arrives just as the first omnibus privacy statute in the United States, the CCPA became effective. Since its January 1 effective date, we continue to wait for finalization of the CCPA regulations and enforcement that was slated for July 1.
-
PodcastZoë Rose: Ethical Hacker, Cyber Security Consultant, Baringa Partners
Zoë Rose is a highly regarded hands-on security specialist, who helps her clients embed resilience across their personal and professional lives. Zoë is a Cisco Champion, Splunk Architect, and has been recognised in the top 50 women in the UK along with the PrivSec 200.



