Please turn on your JavaScript for this page to function normally.
hands
If encryption is so good at protecting data, why do so many businesses succumb to cyberattacks?

Cybercriminals use increasingly complex deception methods, and cybersecurity can be unfamiliar, unintuitive, or inconvenient to operate, recent Mimecast research reveals. No …

person
How businesses use data might not be popular with the public

A KPMG survey reveals a deep disconnect between corporate data practices and the general population’s expectations around transparency and data privacy. As companies collect …

password
Most employees reusing personal passwords to protect corporate data

Nearly two thirds of employees are using personal passwords to protect corporate data, and vice versa, with even more business leaders concerned about this very issue. …

Apple
How to prepare for Apple’s Mail Privacy Protection

Over the last few years, consumers began to be more concerned and have greater understanding of the importance of privacy. In a recent survey conducted by Statista, over half …

privacy
Lack of email validation and opt-in processes hinder organizations from achieving compliance

Pathwire released the results of its Data Compliance Survey, a survey of 1,000 IT and marketing decision-makers across the globe on the most common data privacy and compliance …

person
User data privacy decisions can be easily manipulated

Data privacy is an important topic in the digitalized economy. Recent policy changes have aimed to strengthen users’ control over their own data. Yet new research from …

cloud complexity
Government IT decision makers worried about security risks related to cloud migration

Nearly 70% of U.S. government IT decision makers surveyed view security risks as the top barrier when migrating to modern cloud platforms, a Morning Consult survey reveals. Of …

market
CSaaS market to reach valuation of $87.59 billion by 2025

The threat quotient over the internet has increased phenomenally over the years. According to a survey by Risk Based, data breaches exposed nearly 4.1 bn records only in the …

backup
Move to all-flash object storage to occur within five years

Scality announced the results of a Vanson Bourne survey completed by IT decision makers across the UK, France and Germany. It revealed a fundamental shift in the industry …

Chris Audet
What’s next on the agenda for Chief Compliance Officers?

As demands on the compliance function grow more intense, Chief Compliance Officers (CCOs) must proactively embrace new leadership responsibilities for their role and …

tunnel
What you need to know about transatlantic data transfers

Where does data live and who can access it? This seemingly simple question is, in fact, incredibly complex in the cloud era, as servers often reside abroad and regional data …

puzzle
3 tips for balancing data security and usability

Organizations have many challenges when it comes to cybersecurity, and one that is top of mind for many is striking the right balance between the usability of data and …

Don't miss

Cybersecurity news