Security

 

5 GDPR Pains That Won’t Go Away (CIO Dive)

General Data Protection Regulation caused headaches before enactment. A year later, the pain lingers. The main criticism of GDPR was that it laid down rules, but failed to determi... More

Why Managing Access is Essential for GDPR Compliance (Verdict)

The threat of potentially huge fines was one of the biggest talking points in the run up to the EU GDPR. Now, just over a year after the regulation entered into law, the Informatio... More

Security Needs Versus Worker Accessibility: The Balancing Act in Evolving Technology (TechNative)

The explosion of cloud and “as-a-service” technologies has made it easy for anyone within an organisation to both purchase and use preferred applications, often without interve... More

Box Launches Content Security Tool Shield to Combat Data Leaks (Verdict)

Cloud content management company Box has launched a new content security product to assist in preventing accidental data leakages and “help enterprises secure their most importan... More

Data Savvy Hackers Enhance Password Vulnerability In 2019 (SDC)

Big data is making a number of cybersecurity risks worse than ever. A growing number of companies are starting to explore the need to utilize big data to enhance their digital secu... More

SAP.iO Kicks Off First B2B European Startup Accelerator Focused on Fintech, Governance, Risk, Compliance (HITS)

The SAP.iO Foundry Berlin kicked off a dedicated financial technology program with participants consisting of business-to-business startups focused on finance and governance, risk ... More

Three Reasons Why Killing Passwords Will Improve Your Cloud Security (Cloud Tech)

Because they’re porous, proliferating and turning into primary forms of digital IDs, mobile devices and their passwords are a favorite onramp for hackers wanting access to compan... More

Three Reasons Why Killing Passwords Improves Your Cloud Security (Forbes)

Because they’re porous, proliferating and turning into primary forms of digital IDs, mobile devices and their passwords are a favorite onramp for hackers wanting access to compan... More

Achieving a High Level of Security in CPE Devices (HITS)

As the industry progresses to make CPE devices the epicenter of service delivery – from broadband to wireless connectivity, to entertainment and IoT services – these devices mu... More

Passwordless Authentication: Safer, Better, and About Time (TechGenix)

Passwords are vulnerable to data breaches, especially when careless companies store them in publicly accessible, unsecured databases. Phishing attacks continue to affect users who ... More

Cyber Risk Fears Stop 1 in 4 Businesses From Adopting New Technologies (Verdict)

Close to one in four businesses have admitted that the benefits of adopting innovative new technologies is outweighed by the potential cybersecurity risks that they present.... More

9 Main Security Challenges for the Future of the Internet of Things (ReadWrite)

While IoT devices bring effective communication between devices, automate things, save time and cost and have numerous benefits, there is one thing still concerning the users—iot... More

IT Security Issues are a Blocker to Remote Working (Tech HQ)

Despite pressure to go “remote”, the risks to business and customer data for some employers is too much to bear.... More

Is Personality the Missing Piece of Security Awareness Training? (Security Intelligence)

Employees who don’t seem to follow directions well, especially security-related directions, are the ones who add another threat level to your network and data. I’ve spoken to e... More

How Can Financial Services Stem the Tide of Mobile Phishing Attacks? (Security Intelligence)

According to Forgerock, the financial services industry suffered $6.2B in damage from cyberattacks in Q1 2019, up from $8 million in Q1 2018 — a 77,400 percent increase. Cybercri... More

IBM Security Study: Taxpayers Oppose Local Governments Paying Hackers in Ransomware Attacks (HITS)

IBM Security announced results of a new study that explores taxpayers' point-of-view on ransomware in the wake of growing attacks against cities. The survey highlights that nearly ... More

Google Open-Sources its Privacy Protection Tools (IT Pro Portal)

Google has announced the open-source release of some of its top privacy protection systems. The release of the company's differential privacy library will help organisations of all... More

GDPR and the Cloud (IT Pro)

A year after its first implementation, the General Data Protection Regulation (GDPR) has sent business scrambling to become compliant at the risk of receiving one of the crippling ... More

Will Quantum Computing Revolutionize Cybersecurity? IBM Thinks So (Gigabit)

IBM will begin to provide “quantum-safe cryptography services” on the IBM public cloud in 2020 and is now offering a Quantum Risk Assessment from IBM Security to help customers... More

4 Questions CISOs Need to Ask About Enterprise Cybersecurity (Security Intelligence)

Effective internal cybersecurity depends on chief information security officers (CISOs) and other security leaders knowing exactly what’s happening on their network and how it im... More

Sign up for our newsletters
* indicates required
MESA Newsletters