<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2038511469714819&amp;ev=PageView&amp;noscript=1">

    Uber Security Breach Proves We Have a Long Way To Go When It Comes to Protecting Customers

    23 Nov., 2017

    A covered up security breach from 2016 is causing more controversy for the ride sharing company, Uber.

    Read More

    Cybersecurity and Data Privacy Trends to Watch in 2018

    20 Nov., 2017

    With 2018 swiftly approaching, we take a look at what we think will be the top trends in cybersecurity and data privacy for the year ahead.

    Read More

    Office 365 Exchange Phishing Attack Shows How Important Strong Data Protection Controls Can Be

    17 Nov., 2017

    More than 100 million phishing emails have been sent to Microsoft Office 365 Exchange users in 2017. Find out what happened and why strong encryption...

    Read More

    3 Important Data Protection Regulation Requirements You Should Know if You Use Cloud Services

    15 Nov., 2017

    New data protection regulations are instituted all the time. Here are three important regulation requirements your company should know about if you...

    Read More

    4 Reasons Why Additional Cloud Data Encryption Protection Can Help Your Business

    13 Nov., 2017

    Sometimes the default data encryption offered by cloud services could use a boost to help protect enterprise companies. Here's why.

    Read More

    Amazon steps up its security game. Same can’t be said for a British University

    10 Nov., 2017

    Amazon has introduced a variety of new security features to address the series of issues that have plagued the cloud system since its inception. The...

    Read More

    Thousands of ID cards suspended as Crypto Key flaw is deemed severe

    9 Nov., 2017

    In the past few weeks it’s come to light that almost 60% of an entire nation was vulnerable to ID theft due to a bug affecting Infineon TPM chipsets....

    Read More

    Quantum computers are a threat to IT security

    6 Nov., 2017

    A major breakthrough in quantum computing is coming ever closer – and raising serious questions about IT security. Since contemporary encryption...

    Read More

    Sensitive data of the entire Malaysian population leaked

    3 Nov., 2017

    Unfortunately, data breaches are a near daily occurrence, and while it is not the intention to “name and shame”, each incident presents a learning...

    Read More

    NHS and WannaCry example of unpreparedness to cyber threat

    1 Nov., 2017

    Failure to act on security advice and warnings is unforgivable and is why the WannaCry attack was so successful in bringing a halt to the UK health...

    Read More

    It’s the Final Countdown … to GDPR

    30 Oct., 2017

    The EU General Data Protection Regulation (GDPR) deadline to meet compliance is swiftly approaching. And with multiple studies in the press pointing...

    Read More

    eperi’s Ultimate GDPR Glossary

    27 Oct., 2017

    With the passing of the General Data Protection Regulation (GDPR), many technical terms and acronyms have been born out of the creation of the new...

    Read More

    With increased Office 365 adoption, comes greater security responsibility

    27 Oct., 2017

    Security fears are cited as one of the top reasons for organizations not using cloud Software-as-as-Service (SaaS) platforms, such as Office 365, but...

    Read More

    GDPR for Marketers

    26 Oct., 2017

    With the EU General Data Protection Regulation (GDPR) on the horizon, one might be forgiven for thinking it’s just an issue for IT security teams. In...

    Read More

    How Shadow IT Has Created Big Problems for DLP in the Cloud

    24 Oct., 2017

    Shadow IT is making data loss prevention near impossible. With new security regulations on the way, finding unauthorized apps and devices and...

    Read More
    8 9 10 11 12
    Seite 10 von 13