Last year, more than one billion records were compromised by cyber attacks. With more companies moving to the cloud, that number is likely to...
With GDPR expected to revolutionize the way enterprises store, use and protect personal data, it’s a worrying state of affairs to learn many...
There is a shroud of mystery when the European General Data Protection Regulation is mentionedand it’s a feeling that is common throughout Europe and...
If you've spent any amount of time recently reading about the GDPR and how it's going to affect companies large and small all around the world,...
Numbers from the latest Gemalto Breach Level Index have been released and shows that more data records have been lost/stolen in the first half of...
Something is seriously wrong when you hear Deloitte have suffered a data breach. Aren’t they well known for their cyber security services? What did...
Microsoft unveils new secure solution to protect that will keep data protected, even from themselves. Every step towards better protection for cloud...
Through this series, we have explored how encryption is an effective means of securing data itself and helping organizations to reduce the scope of...
Passing new legislation will inevitably require change and GDPR is no different, leading to modifications in both the way data is processed and the...
Major credit reporting agency breached revealing the sensitive data of over 143 million people including 44 million UK citizens.
While it is vital for organizations to understand the forthcoming General Data Protection Regulation and what it means for their use of sensitive...
Another data exposure where organizations are still holding sensitive personal data unsecured on cloud servers. More poignant when you consider the...
In the first part of our getting to grips with GDPR series, we covered the new regulation and what is meant by data controllers and data processors...
Cyber attackers have become even more sophisticated as they begin to target cloud providers with innovative phishing methods.
IT security, infrastructure or operations have long been responsible for an enterprise’s data security requirements when various business departments...