data protection

Trump signs into law repeal of US consumers’ online privacy protections
It’s official: US Internet service providers and mobile data carriers will be able to to sell or share its customers’ Web browsing and app usage history and other …

How to patch your security blind spots
One of the most challenging – and interesting, and frustrating – aspects of cybersecurity is the sheer unpredictability of industry developments still to come. Sure, analyzing …

Are businesses spending their money on the wrong IT security?
Thales, a leader in critical information systems, cybersecurity and data security, announces the results of its 2017 Thales Data Threat Report, issued in conjunction with …

Enhanced security facilitates your safe move to the cloud
If you haven’t moved at least some of your data to the cloud, you will. It’s inevitable at this point. Even the most highly secured organizations have some of their data on …

Rise of cyber attacks against the public sector
The use of information and communication technologies in the public sector, specifically online government services, is a key factor for being targeted by cybercriminals. …

GDPR: Are you prepared?
Many European and US businesses are ill-prepared for the recently agreed EU General Data Protection Regulation (GDPR) and are at risk of falling foul of its rules around the …

The dangers of connecting phones to connected cars
As smart, connected cars get more ubiquitous, they are often the only option you get when renting a car from a rental agency. With all the reports about car hacking, you might …

Cyber attacks: Hindsight is 20/20, GDPR is even better
The dust is beginning to settle on the EU referendum result. But, while the UK’s departure from the union is set to shake things up for many businesses nationwide, there’s at …

Enterprises too complacent in the face of rising mobile threats
Enterprises continue to fall short when it comes to protecting corporate data on mobile apps and devices, according to the Mobile Security and Risk Review released by …

Businesses need to protect data, not just devices
As organizations embrace the digital transformation of their business, they are increasingly facing new security concerns. More companies are moving away from device-centric, …
US DOJ can’t access data stored abroad with just a warrant, court rules
The US Department of Justice cannot force Microsoft to produce the contents of a customer’s email account stored on a server located outside the US with just a warrant, a US …

Confusion reigns around data protection requirements
Confusion reigns among UK businesses around data protection requirements, according to Delphix. From June 2018, any business that offers goods and services to the EU or …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility