All Breaches and Vulnerabilities articles – Page 6
-
Video
Best Practices for Detecting, Preventing and Recovering From Ransomware
Ransomware continues to cause huge losses and harms across the globe. But taking a proactive approach to security and business continuity can reduce the likelihood of falling victim to an attack—and reduce the damage that occurs if you are targeted.
-
Video
The Dangers of AI-Driven Mass Surveillance
Artificial intelligence is driving huge improvements in fields as diverse as medicine and climate monitoring. But from biometric identification to “social credit” scoring systems, AI is also providing new ways for governments and large corporations to track and surveil people—with significant implications for their privacy and freedom.
-
Video
Can Privacy Enhancing Technologies (PETs) Solve the Data Transfer Puzzle?
The legal issues around data transfers continue to cause confusion and consume resources. Many believe the solution lies in Privacy Enhancing Technologies (PETs). The US and UK governments are even collaborating on an “innovation prize challenge” to encourage the development of PETs for data transfers.
-
Video
Keeping Pace with Emerging Threats
Cyber criminals are leveraging innovative techniques and taking advantage of new security vulnerabilities. Organizations must evolve and adapt their defenses to protect against the next wave of cybersecurity threats.
-
Video
Data Retention and Minimisation: Best Practice
Getting data retention and minimisation right is crucial to ensuring effective data protection compliance. Only collecting the data you need, and only storing it for as long as required, significantly reduces the likelihood of a data breach or other violation.
-
Video
How to Avoid Software Supply Chain Attacks
From Solarwinds to Kaseya to Log4j—the security risk from software supply chain attacks shows no sign of abating.
-
Feature
Risk and Resilience in a Dynamic Environment
Effective risk and resiliency within an organization is arguably the heart and soul of success.
-
Feature
Key Tactics for Effective Cybersecurity
As the pandemic pushed millions of workers home, corporations rushed to build infrastructure to support their new remote workforce.
-
Feature
Meet the expert: Jonathan Craven to speak at PrivSec World Forum
Privacy leader, Jonathan Craven will be among the experts speaking at PrivSec World Forum, this month.
-
News
The PICCASO Privacy Awards
To mark four years since the GDPR came into effect, Privacy Culture Limited & GRC World Forums in partnership with PICCASO are delighted to launch the inaugural ”PICCASO Privacy Awards” to recognise and celebrate the many extraordinary achievements of the wide community of privacy professionals.
-
Feature
Meet the expert: Bill Mew to speak at PrivSec World Forum
We are delighted to announce that digital ethics campaigner and global cybersecurity expert, Bill Mew will speak at PrivSec World Forum next month.
-
Feature
Don’t miss the editor’s top five sessions at PrivSec World Forum
With two weeks to go to PrivSec World Forum, event editor and research director, Robert Bateman shares his top five sessions to look out for.
-
Feature
GDPR Four Years On: How Has the Law Changed the World, and How Can It Be Improved?
The General Data Protection Regulation (GDPR) is perhaps the EU’s best-known and most-misunderstood law.
-
Video
Creating a Robust Data Breach Management Policy
This session will consider the key elements of a data breach management policy, from detection and notification to mitigation and review stages.
-
Q&A
Meet the expert: Merilyne Davies among guests at PrivSec: World Forum
Visitors to next month’s PrivSec World Forum can hear the views of data protection senior, Merilyne Davies, we are delighted to announce.
-
Feature
Meet the expert: Jose Belo to speak at PrivSec Focus: Enterprise Risk
Audiences can hear the views of data privacy specialist, Jose Belo, when they tune into PrivSec Focus: Enterprise Risk next week.
-
Feature
Meet the expert: Scott Warren among speakers at PrivSec Focus: Enterprise Risk
We are delighted to announce that cybersecurity and data privacy leader, Scott Warren will be lending his expertise to the discussion at PrivSec Focus: Enterprise Risk.
-
Analysis
Cash App Data Breach Exposes Over 8-Million Customers
Often when we think of data breaches, we think of external cyber threat actors utilizing ransomware to make a profit. We rarely think that our own employees could be the culprit of a massive data breach.
-
Video
Preventing Supply Chain Attacks: Best Practice
PrivSec Third-Party Risk will explore the ongoing threat of supply chain attacks and provide actionable advice on reducing your risk exposure.
-
Video
Fast, smart and connected: a renewed approach to third-party risk management
In this webinar, Anna Mazzone, EMEA VP & Head of Risk & ESG at ServiceNow and Linda Tuck Chapman discuss options for strengthening the process to deliver a more efficient risk assessment process, what are the best companies doing, and how is ESG intersecting with supply chain risk management and third party risk management.