Please turn on your JavaScript for this page to function normally.
GDPR
Navigating GDPR in the mobile enterprise

Securing data and protecting privacy in a connected world is already a major challenge for any enterprise, and mobility only magnifies this challenge. Mobile devices are …

money
Payment security: What are the biggest challenges?

With cybercrime on the increase, payment card security is increasingly a focus for companies and consumers alike. The Payment Card Industry Data Security Standard (PCI DSS) is …

architecture
SIEM challenges: Why your security team isn’t receiving valuable insights

Today, many enterprises use security information and event management (SIEM) software to help detect suspicious activity on their networks. However, to be effective …

GDPR
Integrating GDPR into your day to day IT practices

GDPR, four letters that when combined strike fear into the heart of any sysadmin. Luckily, there is quite some time before it comes into force, which means getting into the …

bridge
What’s needed for the first NYS DFS cybersecurity transitional phase?

The first transitional phase of the New York State’s Department of Financial Services (NYS DFS) cybersecurity regulation is upon us. As of August 28th, 2017 covered entities …

locks
Disturbing lack of cyber attack awareness among directors

Britain’s top firms and charities urgently need to do more to protect themselves from online threats, according to new government research and a ‘cyber health check’. One in …

Qualys
Why you need to implement security controls across your environment

In this podcast recorded at Black Hat USA 2017, Tim White, Director of Product Management, Policy Compliance at Qualys, discusses the importance of security configuration …

building
STIX and TAXII: Sharing cyber threat intelligence

In this podcast recorded at Black Hat USA 2017, Allan Thomson, CTO at LookingGlass Cyber Solutions, talks about STIX and TAXII. STIX (Structured Threat Information Expression) …

London
New UK data protection law to offer more control to users

UK citizens will have more control over how their personal information is used by businesses, and the right to demand from social media companies and online traders the …

cloud
Where does corporate cloud security responsibility begin and service provider responsibility end?

Security has, is and will continue to be the cornerstone of advancement in the digital age. Conditions of trust, real or expected, are essential for digital economies to grow …

GDPR
Only 2% of “GDPR-ready” organizations are actually compliant

Only nine percent of UK organizations that believe they are prepared for the General Data Protection Regulation (GDPR) actually are, new research from Veritas has found. In …

GDPR
As GDPR approaches, retail data breaches remain unacceptably high

Two in five retailers across the globe have experienced a data breach in the past year, according to Thales and 451 Research. The report reveals that 43 percent of retailers …

Don't miss

Cybersecurity news