Please turn on your JavaScript for this page to function normally.
identity theft
Is differential privacy the ideal privacy-enhancing computation technique for your business?

As security & risk management (SRM) leaders globally adjust to a “new normal” brought about by the COVID-19 pandemic, businesses must adapt their privacy programs for …

syringe
Vaccinate your data: Addressing and adapting to new data risks

It seems like only yesterday that we were all reading up on what the implementation of the European Union’s General Data Protection Regulation (GDPR) would mean for businesses …

iPhone
Protect your smartphone from radio-based attacks

By now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone …

backup
Move to all-flash object storage to occur within five years

Scality announced the results of a Vanson Bourne survey completed by IT decision makers across the UK, France and Germany. It revealed a fundamental shift in the industry …

healthcare
Ensuring HIPAA compliance when using the cloud

Accelerated by the pandemic, health IT has continued to innovate at pace, while having to balance data protection and regulatory rules. However, critical transformations – …

insider threat
What is the cost of an insider data breach?

As companies emerge from the pandemic, and 40% of employees are planning to switch jobs, corporate data is at risk. Files are being uploaded, shared, synced and emailed by …

PCI
1 in 5 companies fail PCI compliance assessments of their infrastructure

According to a recent poll by SentryBay, the infrastructure of over 21% of surveyed companies has failed key PCI compliance assessments, designed to assist them to maintain …

healthcare
Health insurers facing growing risk of customer data theft

The U.S. health insurance industry is facing growing risks from cybersecurity threats due to the increasingly sophisticated techniques used by cybercriminals amid the …

tunnel
What you need to know about transatlantic data transfers

Where does data live and who can access it? This seemingly simple question is, in fact, incredibly complex in the cloud era, as servers often reside abroad and regional data …

backup
62% of consumers believe hyperscale computing will have a positive impact over the next five years

A majority of consumers believe hyperconnectivity driven by hyperscale computing will positively impact them within five years, according to a report from Cadence Design …

puzzle
3 tips for balancing data security and usability

Organizations have many challenges when it comes to cybersecurity, and one that is top of mind for many is striking the right balance between the usability of data and …

encryption
Enhancing cloud security with a two-step cryptography technique

The central goal of cloud computing is to provide fast, easy-to-use computing and data storage services at a low cost. However, the cloud environment comes with data …

Don't miss

Cybersecurity news