Worldwide digital transformation predictions
While IDC continues to see tremendous momentum and influence of digital transformation (DX) on technology spending worldwide, across all geographies and industries, 59% of …
BEC scammers stealing millions from home buyers
Business Email Compromise (BEC) scams have been on the rise for the last few years, and no industry is safe from these scammers. It has been revealed last week that art …
New Amazon S3 encryption and security features introduced
Amazon Web Services has announced the availability of five new encryption and security features for the Amazon S3 cloud storage service. These include: Default object …
Have you heard about Bitcoin multipliers?
Professedly, they are services that multiply any Bitcoin amount you send them by several times, and return to you the total amount in a mere hours. How do they do that? …
Lack of proper security solutions is annihilating companies’ reputations
Businesses are not meeting consumer expectations around protecting personal information, according to a study conducted by the Ponemon institute across the U.S., U.K., Germany …
How GDPR affects your organization
The countdown is on and global businesses now have just six months until the General Data Protection Regulation (GDPR) is enforced. A recent study from Trend Micro has found …
Top 10 ways to fund the shift to digital business
With many options for digital business transformation requiring significant investment, Gartner has identified the top 10 ways to fund the shift to digital business. According …
Security, privacy issues we need to solve before non-medical implants become pervasive
The cybernetic revolution is happening, and it’s imperative that civil liberties and privacy issues are addressed by system designers, innovators, regulators, and …
Tor Browser flaw leaks users’ real IP address
The Tor Project has issued an emergency security bugfix release of Tor Browser, to prevent user IP address leakage due to a still unpatched Firefox bug. The bug is present …
Infosec expert viewpoint: Vulnerability patching
Vulnerability patching is one of the most useful and cost-effective methods to mitigate a plethora of security threats. Here’s what infosec experts think about the …
The evolution of BYOD security in a mobile-first world
Bitglass’ research team surveyed 200 IT and security professionals at a national Gartner conference to learn more about the evolution of BYOD security in a mobile-first world. …
GDPR to have limited impact on M&A activity
Dealmakers believe that the new General Data Protection Regulation (GDPR) will likely only have a modest impact on M&A activity in the EU, according to a recent survey …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades