<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2038511469714819&amp;ev=PageView&amp;noscript=1">

No Cybersecurity Staff? Turn to Software Solutions

1 Dec., 2017

The world is in short supply of cybersecurity personnel.

Read More

Security For The Internet Might Be Right Around The Corner

29 Nov., 2017

Aimed at protecting against future cyber attacks, security researchers and scientists have developed a new defense mechanism with encryption at the...

Read More

What is the DPIA and How Does It Fit into Your Company's Compliance Guidelines?

27 Nov., 2017

If you've been ignoring the DPIA and how it fits into your company's GDPR compliance guidelines, it's time to pay more attention. Here's what you...

Read More

400 of the world’s top websites are recording users’ keystrokes

24 Nov., 2017

Uber hushed up; your keystrokes are being tracked; and staying safe online this festive period. These news caught our eye this week.

Read More

Keep Going with GDPR Preparations - Brexit will not affect Compliance Efforts

24 Nov., 2017

The UK’s Information Commissioner’s Office has confirmed it will still honor binding corporate rules on data protection.

Read More

Uber Security Breach Proves We Have a Long Way To Go When It Comes to Protecting Customers

23 Nov., 2017

A covered up security breach from 2016 is causing more controversy for the ride sharing company, Uber.

Read More

Cybersecurity and Data Privacy Trends to Watch in 2018

20 Nov., 2017

With 2018 swiftly approaching, we take a look at what we think will be the top trends in cybersecurity and data privacy for the year ahead.

Read More

Office 365 Exchange Phishing Attack Shows How Important Strong Data Protection Controls Can Be

17 Nov., 2017

More than 100 million phishing emails have been sent to Microsoft Office 365 Exchange users in 2017. Find out what happened and why strong encryption...

Read More

3 Important Data Protection Regulation Requirements You Should Know if You Use Cloud Services

15 Nov., 2017

New data protection regulations are instituted all the time. Here are three important regulation requirements your company should know about if you...

Read More

4 Reasons Why Additional Cloud Data Encryption Protection Can Help Your Business

13 Nov., 2017

Sometimes the default data encryption offered by cloud services could use a boost to help protect enterprise companies. Here's why.

Read More

Amazon steps up its security game. Same can’t be said for a British University

10 Nov., 2017

Amazon has introduced a variety of new security features to address the series of issues that have plagued the cloud system since its inception. The...

Read More

Thousands of ID cards suspended as Crypto Key flaw is deemed severe

9 Nov., 2017

In the past few weeks it’s come to light that almost 60% of an entire nation was vulnerable to ID theft due to a bug affecting Infineon TPM chipsets....

Read More

Quantum computers are a threat to IT security

6 Nov., 2017

A major breakthrough in quantum computing is coming ever closer – and raising serious questions about IT security. Since contemporary encryption...

Read More

Sensitive data of the entire Malaysian population leaked

3 Nov., 2017

Unfortunately, data breaches are a near daily occurrence, and while it is not the intention to “name and shame”, each incident presents a learning...

Read More

NHS and WannaCry example of unpreparedness to cyber threat

1 Nov., 2017

Failure to act on security advice and warnings is unforgivable and is why the WannaCry attack was so successful in bringing a halt to the UK health...

Read More
8 9 10 11 12
Seite 10 von 13