<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2038511469714819&amp;ev=PageView&amp;noscript=1">

    The Advantages and Disadvantages of Cloud Computing

    2 Feb., 2018

    2017 was a banner year for data breaches. Look back at the year’s biggest hacks and learn how enterprises can avoid the same mistakes while cloud...

    Read More

    Biometrics leading the security charge for Millennials

    1 Feb., 2018

    The public has spoken and the demand for security has never been greater according to latest IBM Security Study.

    Read More

    Data breach at healthcare provider threatens half the population of Norway

    26 Jan., 2018

    From HRMC warning taxpayers over scammers to a data breach of Norway’s most popular healthcare provider and the dark web selling babies’ social...

    Read More

    Is Your Organization Ready for GDPR?

    25 Jan., 2018

    New study finds UK businesses are the most in shape and equipped when it comes to GDPR compliance.

    Read More

    Why Utilizing Encryption Technology Could Save Your Company From Serious Breaches

    23 Jan., 2018

    The threat of data theft from large corporations by malicious attackers is an everyday reality now. Here’s why encryption technology could save...

    Read More

    With Increased Cloud Adoption Comes Even More Risk For The Data

    19 Jan., 2018

    Who oversees security in the cloud? The cloud provider? The cloud user? Or is it both? Either way, there seems to be an air of uncertainty when it...

    Read More

    Survey reveals CISOs lack confidence when it comes to keeping up with cyber attackers

    18 Jan., 2018

    CISOs are feeling less confident than ever about cybersecurity.

    Read More

    How to Determine if you Need a Cloud Access Security Broker

    17 Jan., 2018

    With the cloud becoming a prevalent force in many enterprise companies, Cloud Access Security Brokers are becoming a big deal. Here's how to find...

    Read More

    Why Data Sovereignty is Transforming Cloud Services Adoption and How it Will Affect Your Business

    16 Jan., 2018

    Like people, digital data can’t just travel wherever it wants. Learn how data sovereignty is changing the adoption of the cloud and how it’s...

    Read More

    Social Networking site provides encrypted open-sourced security for group chat

    15 Jan., 2018

    The online social media and social networking behemoth known as Facebook has incorporated encryption technology within one of its new tools.

    Read More

    5 Things You Didn’t Know About Modern Cloud Data Encryption

    12 Jan., 2018

    More and more enterprise companies are adopting the cloud to store and transfer valuable data. Here are five things you may not know about modern...

    Read More

    Mobile retailer under fire for data breach

    11 Jan., 2018

    Just a few days into 2018 and already the UK’s Information Commissioner’s Office (ICO) is back to work issuing fines for companies who have been...

    Read More

    Data Protection by Pseudonymization

    10 Jan., 2018

    Pseudonymization and anonymization are two options available to companies aiming to implement an important principle of the European General Data...

    Read More

    Lapse in encryption security blamed for data breach at American Retailer

    8 Jan., 2018

    We are less than a week into the New Year and there is already news related to data breaches, malware and encryption.

    Read More

    How to Protect Your Cloud Data from Hackers

    4 Jan., 2018

    Sensitive customer information stored in cloud applications is highly vulnerable to attacks from malicious outsiders. Protect your cloud data from...

    Read More
    6 7 8 9 10
    Seite 8 von 13