<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2038511469714819&amp;ev=PageView&amp;noscript=1">

    No Cybersecurity Staff? Turn to Software Solutions

    1 Dec., 2017

    The world is in short supply of cybersecurity personnel.

    Read More

    Security For The Internet Might Be Right Around The Corner

    29 Nov., 2017

    Aimed at protecting against future cyber attacks, security researchers and scientists have developed a new defense mechanism with encryption at...

    Read More

    What is the DPIA and How Does It Fit into Your Company's Compliance Guidelines?

    27 Nov., 2017

    If you've been ignoring the DPIA and how it fits into your company's GDPR compliance guidelines, it's time to pay more attention. Here's what you...

    Read More

    400 of the world’s top websites are recording users’ keystrokes

    24 Nov., 2017

    Uber hushed up; your keystrokes are being tracked; and staying safe online this festive period. These news caught our eye this week.

    Read More

    Keep Going with GDPR Preparations - Brexit will not affect Compliance Efforts

    24 Nov., 2017

    The UK’s Information Commissioner’s Office has confirmed it will still honor binding corporate rules on data protection.

    Read More

    Uber Security Breach Proves We Have a Long Way To Go When It Comes to Protecting Customers

    23 Nov., 2017

    A covered up security breach from 2016 is causing more controversy for the ride sharing company, Uber.

    Read More

    Cybersecurity and Data Privacy Trends to Watch in 2018

    20 Nov., 2017

    With 2018 swiftly approaching, we take a look at what we think will be the top trends in cybersecurity and data privacy for the year ahead.

    Read More

    Office 365 Exchange Phishing Attack Shows How Important Strong Data Protection Controls Can Be

    17 Nov., 2017

    More than 100 million phishing emails have been sent to Microsoft Office 365 Exchange users in 2017. Find out what happened and why strong...

    Read More

    3 Important Data Protection Regulation Requirements You Should Know if You Use Cloud Services

    15 Nov., 2017

    New data protection regulations are instituted all the time. Here are three important regulation requirements your company should know about if...

    Read More

    4 Reasons Why Additional Cloud Data Encryption Protection Can Help Your Business

    13 Nov., 2017

    Sometimes the default data encryption offered by cloud services could use a boost to help protect enterprise companies. Here's why.

    Read More

    Amazon steps up its security game. Same can’t be said for a British University

    10 Nov., 2017

    Amazon has introduced a variety of new security features to address the series of issues that have plagued the cloud system since its inception....

    Read More

    Thousands of ID cards suspended as Crypto Key flaw is deemed severe

    9 Nov., 2017

    In the past few weeks it’s come to light that almost 60% of an entire nation was vulnerable to ID theft due to a bug affecting Infineon TPM...

    Read More

    Quantum computers are a threat to IT security

    6 Nov., 2017

    A major breakthrough in quantum computing is coming ever closer – and raising serious questions about IT security. Since contemporary encryption...

    Read More

    Sensitive data of the entire Malaysian population leaked

    3 Nov., 2017

    Unfortunately, data breaches are a near daily occurrence, and while it is not the intention to “name and shame”, each incident presents a learning...

    Read More

    NHS and WannaCry example of unpreparedness to cyber threat

    1 Nov., 2017

    Failure to act on security advice and warnings is unforgivable and is why the WannaCry attack was so successful in bringing a halt to the UK...

    Read More
    7 8 9 10 11
    Seite 9 von 12