data protection

What’s next on the agenda for Chief Compliance Officers?
As demands on the compliance function grow more intense, Chief Compliance Officers (CCOs) must proactively embrace new leadership responsibilities for their role and …

What you need to know about transatlantic data transfers
Where does data live and who can access it? This seemingly simple question is, in fact, incredibly complex in the cloud era, as servers often reside abroad and regional data …

3 tips for balancing data security and usability
Organizations have many challenges when it comes to cybersecurity, and one that is top of mind for many is striking the right balance between the usability of data and …

SMEs strongly positioned in the data protection sector
Small and medium-sized enterprises seem to be strongly positioned in the data protection sector, according to a recent survey of 600 German, French and British executives …

Effects of the pandemic on consumer security behaviors
IBM announced the results of a global survey examining consumers’ digital behaviors during the pandemic, as well as their potential long-term impact on cybersecurity. …

Bad cybersecurity behaviors plaguing the remote workforce
A report from Tessian reveals that 56% of IT leaders believe their employees have picked up bad cybersecurity behaviors since working from home. As organizations make plans …

The evolution of cybersecurity within network architecture
The vulnerable state of the world during the pandemic paved way for an aggressive onslaught of attacks, with around 39 percent of businesses experiencing a cybersecurity …

AI-based diagnostic processes that safeguard data privacy
Digital medicine is opening up entirely new possibilities. For example, it can detect tumors at an early stage. But the effectiveness of new AI algorithms depends on the …

Security leaders more concerned about legal settlements than regulatory fines
An overwhelming 90% of security leaders are concerned about group legal settlements following a serious data breach, compared to 85% who are worried about regulatory fines, …

Consumers ID theft concerns only growing
A Benenson Strategy Group study surveyed over 700 adults on their concerns about ID theft and cybercrime, the type of help they feel they would need to address those concerns, …

FWaaS market continues to grow
The Firewall-as-a-Service (FWaaS) market is anticipated to witness a CAGR of 22% between 2021 and 2026, according to ResearchAndMarkets. Flexible scalability, secure access …

Application level data protection hindered by misperceptions and complexities
Companies plan to take extensive actions in the next 12 months to address a broad concern for sensitive data being unprotected in use at the application layer, Entrust and …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility