compliance
GDPR could create $320 billion in fines
Unsurprisingly, many consumer products organisations are taking risks with the security and privacy of their customer data. They are failing to put in place proper processes …
The EU-US Privacy Shield: What happens next?
Yesterday the European Commission formally approved the EU-US Privacy Shield, making transfers of personal data to the US legal under European law for companies that have …
Risk analytics market to experience serious growth
The risk analytics market is estimated to grow from USD 16.55 billion in 2016 to USD 30.18 billion by 2021, at a Compound Annual Growth Rate (CAGR) of 12.8%, according to …
Boardroom execs still don’t know the value of data
Almost two thirds of businesses still don’t know the value of critical data assets being targeted by cybercriminals. IRM surveyed security heads at their recent conference, …
Analyze your data: Where is it and who has it?
It is becoming widely recognized that “unknown” data leakage of PCI data, and more broadly other Personally Identifiable Information, within enterprises is the highest value …
Control system security compliance: Assess risk before it’s too late
Cybercrime is no longer a problem restricted to IT. The Department of Homeland Security recently warned that thousands of industrial control systems (ICS) can be hacked …
Overcoming the barriers to ISO 27001 adoption for success on G-Cloud
A recent attention grabbing headline that was just too controversial to ignore: “Sloppy SaaS firms lose out on G-Cloud deals, research suggests”. In the article, …
Payment Application Data Security Standard 3.2 released
The PCI Security Standards Council (PCI SSC) published a new version of its data security standard for payment software, the Payment Application Data Security Standard …
Reputation damage and brand integrity: Top reasons for protecting data
Vormetric announced the results of the European Edition of the 2016 Vormetric Data Threat Report. It focuses on responses from IT security leaders in European organisations, …
Behavior is the new authentication: A look into the future
In the next few years organizations will face extreme IT security challenges. Hackers are targeting humans instead of machines. All the most costly cyber attacks (APTs, …
Financial services IT pros overconfident in breach detection capabilities
A new Tripwire study evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place to quickly detect a cyber …
Docker Security Scanning: Generate a security profile for Docker images
Docker announced Docker Security Scanning, an opt-in service for Docker Cloud private repo plans that provides a security assessment of the software included in container …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities