<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2038511469714819&amp;ev=PageView&amp;noscript=1">

Thousands of ID cards suspended as Crypto Key flaw is deemed severe

9 Nov., 2017

In the past few weeks it’s come to light that almost 60% of an entire nation was vulnerable to ID theft due to a bug affecting Infineon TPM...

Read More

Quantum computers are a threat to IT security

6 Nov., 2017

A major breakthrough in quantum computing is coming ever closer – and raising serious questions about IT security. Since contemporary encryption...

Read More

Sensitive data of the entire Malaysian population leaked

3 Nov., 2017

Unfortunately, data breaches are a near daily occurrence, and while it is not the intention to “name and shame”, each incident presents a learning...

Read More

NHS and WannaCry example of unpreparedness to cyber threat

1 Nov., 2017

Failure to act on security advice and warnings is unforgivable and is why the WannaCry attack was so successful in bringing a halt to the UK...

Read More

It’s the Final Countdown … to GDPR

30 Oct., 2017

The EU General Data Protection Regulation (GDPR) deadline to meet compliance is swiftly approaching. And with multiple studies in the press...

Read More

eperi’s Ultimate GDPR Glossary

27 Oct., 2017

With the passing of the General Data Protection Regulation (GDPR), many technical terms and acronyms have been born out of the creation of the new...

Read More

With increased Office 365 adoption, comes greater security responsibility

27 Oct., 2017

Security fears are cited as one of the top reasons for organizations not using cloud Software-as-as-Service (SaaS) platforms, such as Office 365,...

Read More

GDPR for Marketers

26 Oct., 2017

With the EU General Data Protection Regulation (GDPR) on the horizon, one might be forgiven for thinking it’s just an issue for IT security teams....

Read More

How Shadow IT Has Created Big Problems for DLP in the Cloud

24 Oct., 2017

Shadow IT is making data loss prevention near impossible. With new security regulations on the way, finding unauthorized apps and devices and...

Read More

Insider data leaks at UK retailer leaves staff furious

23 Oct., 2017

Every organization has the potential to be hit by an insider threat and this needs to be understood by all levels of a business. Is there anything...

Read More

Brits 20 times more likely to be defrauded online than held up in the street

19 Oct., 2017

The first ever NCSC report reaffirms the importance of data protection at the heart of security.

Read More

How to Improve Office 365 Encryption to Meet GDPR Standards

18 Oct., 2017

Microsoft Office 365 is used by millions of daily users who store personal data in the cloud. With the GDPR and its new cybersecurity standards...

Read More

7 Interesting Takeaways from the Global Cloud Security Study

16 Oct., 2017

The Ponemon Institute’s global survey of over 3000 IT security professionals reveals some interesting takeaways about on the cloud data security...

Read More

Spotlight on Amazon Cloud Security – Lax security practices and their devastating consequences

13 Oct., 2017

With a spate of Amazon S3 data repository breaches making the news recently, we look at why this is and what companies need to do to protect...

Read More

4 Ways Your Cloud Data is at Risk

12 Oct., 2017

Last year, more than one billion records were compromised by cyber attacks. With more companies moving to the cloud, that number is likely to...

Read More
6 7 8 9 10
Seite 8 von 10