![social media](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100852/socialmedia-400x200.jpeg)
Consumers believe social media sites pose greatest risk to data
A majority of consumers are willing to walk away from businesses entirely if they suffer a data breach, with retailers most at risk, according to Gemalto. Two-thirds (66%) are …
![Marriott](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095631/marriott-400x200.jpg)
Industry reactions to the enormous Marriott data breach
On September 8, 2018, Marriott received an alert from an internal security tool regarding an attempt to access the Starwood guest reservation database in the United States. …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102610/gdpr-3-400x200.jpg)
Keeping data swamps clean for ongoing GDPR compliance
The increased affordability and accessibility of data storage over recent years can be both a benefit and a challenge for businesses. While the ability to stockpile huge …
![EU](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100613/EU-lock2-400x200.jpg)
GDPR’s impact: The first six months
GDPR is now six months old – it’s time to take an assessment of the regulation’s impact so far. At first blush it would appear very little has changed. There are no …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102343/face-400x200.jpg)
Privacy laws do not understand human error
In a world of increasingly punitive regulations like GDPR, the combination of unstructured data and human error represents one of the greatest risks an organization faces. …
![Woman working on laptop](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095739/woman-laptop-400x200.jpg)
What’s keeping Europe’s top infosec pros awake at night?
As the world adapts to GDPR and puts more attention on personal privacy and security, Europe’s top information security professionals still have doubts about the industry’s …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095742/data-400x200.jpg)
Cybersecurity and ethical data management: Getting it right
Data can provide information, information can lead to insight and knowledge, and knowledge is power. It’s no wonder, then, that seemingly everybody in this modern, …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102610/gdpr-3-400x200.jpg)
M&A transactions may be stalling due to GDPR compliance concerns
An increasing number of M&A transactions may be stalling because of concerns over GDPR compliance, according to a survey of EMEA M&A professionals conducted by …
![stop](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113558/stop-1-400x200.jpg)
Consumers would stop engaging with a brand online following a breach
Ping Identity surveyed more than 3,000 people across the United States, United Kingdom, France and Germany to find out what they expect from brands when it comes to the …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101213/data-400x200.jpg)
Data revolution backlash: Consumers prepared to take decisive action if organizations mishandle data
US consumers believe technological advancements pose a risk to their data privacy; believe it is the responsibility of organisations to make the purpose of data use clear and …
![Nvidia Tesla](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095819/nvidia-tesla-400x200.jpg)
GPU side channel attacks can enable spying on web activity, password stealing
Computer scientists at the University of California, Riverside have revealed for the first time how easily attackers can use a computer’s graphics processing unit, or …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103744/GDPR-400x200.jpg)
Post implementation, GDPR costs higher than expected
A Versasec survey examining the global impact of the General Data Protection Regulation (GDPR) nearly six months after its roll-out shows the privacy regulation costs more to …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege