Infosecurity Europe 2016

What happens to consumer trust when a business is breached?
In this podcast recorded at Infosecurity Europe 2016, Bill Mann, Chief Product Officer at Centrify, talks about what happens to consumer trust when a business is breached. The …

Cloud security and data privacy laws
In this podcast recorded at Infosecurity Europe 2016, Willy Leichter, VP of Cloud Security at CipherCloud, talks about issues around cloud security and data privacy laws, and …

CipherCloud unveils first GDPR-ready cloud security solution
CipherCloud announced the availability of a cloud security solution designed to help companies comply with the European General Data Protection Requirement (GDPR). Their Cloud …

Photos: Infosecurity Europe 2016
Taking place in London right now is Infosecurity Europe 2016. Europe’s largest information security event has more companies exhibiting than ever before, and a …

Do companies take customers’ security seriously?
75 percent of adults in the UK would stop doing business with, or would cancel membership to, an organisation if it was hacked. This suggests, however, that a quarter would …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility