<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2038511469714819&amp;ev=PageView&amp;noscript=1">

    Thousands of ID cards suspended as Crypto Key flaw is deemed severe

    9 Nov., 2017

    In the past few weeks it’s come to light that almost 60% of an entire nation was vulnerable to ID theft due to a bug affecting Infineon TPM...

    Read More

    Quantum computers are a threat to IT security

    6 Nov., 2017

    A major breakthrough in quantum computing is coming ever closer – and raising serious questions about IT security. Since contemporary encryption...

    Read More

    Sensitive data of the entire Malaysian population leaked

    3 Nov., 2017

    Unfortunately, data breaches are a near daily occurrence, and while it is not the intention to “name and shame”, each incident presents a learning...

    Read More

    NHS and WannaCry example of unpreparedness to cyber threat

    1 Nov., 2017

    Failure to act on security advice and warnings is unforgivable and is why the WannaCry attack was so successful in bringing a halt to the UK...

    Read More

    It’s the Final Countdown … to GDPR

    30 Oct., 2017

    The EU General Data Protection Regulation (GDPR) deadline to meet compliance is swiftly approaching. And with multiple studies in the press...

    Read More

    eperi’s Ultimate GDPR Glossary

    27 Oct., 2017

    With the passing of the General Data Protection Regulation (GDPR), many technical terms and acronyms have been born out of the creation of the new...

    Read More

    With increased Office 365 adoption, comes greater security responsibility

    27 Oct., 2017

    Security fears are cited as one of the top reasons for organizations not using cloud Software-as-as-Service (SaaS) platforms, such as Office 365,...

    Read More

    GDPR for Marketers

    26 Oct., 2017

    With the EU General Data Protection Regulation (GDPR) on the horizon, one might be forgiven for thinking it’s just an issue for IT security teams....

    Read More

    How Shadow IT Has Created Big Problems for DLP in the Cloud

    24 Oct., 2017

    Shadow IT is making data loss prevention near impossible. With new security regulations on the way, finding unauthorized apps and devices and...

    Read More

    Insider data leaks at UK retailer leaves staff furious

    23 Oct., 2017

    Every organization has the potential to be hit by an insider threat and this needs to be understood by all levels of a business. Is there anything...

    Read More

    Brits 20 times more likely to be defrauded online than held up in the street

    19 Oct., 2017

    The first ever NCSC report reaffirms the importance of data protection at the heart of security.

    Read More

    How to Improve Office 365 Encryption to Meet GDPR Standards

    18 Oct., 2017

    Microsoft Office 365 is used by millions of daily users who store personal data in the cloud. With the GDPR and its new cybersecurity standards...

    Read More

    7 Interesting Takeaways from the Global Cloud Security Study

    16 Oct., 2017

    The Ponemon Institute’s global survey of over 3000 IT security professionals reveals some interesting takeaways about on the cloud data security...

    Read More

    Spotlight on Amazon Cloud Security – Lax security practices and their devastating consequences

    13 Oct., 2017

    With a spate of Amazon S3 data repository breaches making the news recently, we look at why this is and what companies need to do to protect...

    Read More

    4 Ways Your Cloud Data is at Risk

    12 Oct., 2017

    Last year, more than one billion records were compromised by cyber attacks. With more companies moving to the cloud, that number is likely to...

    Read More
    8 9 10 11 12
    Seite 10 von 12