All Business & Knowledge articles – Page 4
-
Video
Building Your Security Dream Team
How can you guarantee that your security team has the right skills and resources to implement your cyber security plan?
-
Video
How Diversity Can Enable Organisations to Combat Security Risks
A diverse cybersecurity team is critical to generating ideas and processes needed to confront security risks.
-
Video
The Evolving Security Landscape - Trends to Expect in 2021 and Beyond
What is the current state of cybercrime and what are the common types of incidents being reported?
-
Feature
Secure foundations: an interview with Zoë Rose
PrivSec Global speaker Zoë Rose talks us through her journey into cyber security and her thoughts on common enterprise mistakes.
-
ebook
Rethinking Data Protection: The Human-centric Approach
The truth about traditional data security. Traditional cybersecurity was hinged on event-centric responses: Build a wall at the perimeter, control what passes in and out through that wall, and respond when something suspicious happens.
-
Feature
Securing APIs: Best practices for keeping your data and infrastructure safe
With the attack surface for APIs continually increasing, Debbie Walkowski outlines the potential risks and best practices for keeping APIs secure.
-
Q&A
Non-linearity, neurodiversity and the skills gap
A Q&A with UK Cyber Security Association founder Lisa Ventura
-
Webinar
A Necessary Change in the Data Protection Mindset
It is time for a paradigm shift in security.
-
Feature
COVID-19 FOCUS: Compliance, cloud migration and securing the “new normal”
As remote working looks set to become the new normal, businesses need to ensure their corporate information and data protection is secure. In the first in a series of Covid-themed articles this week, Andy Beverley outlines some of the key considerations.
-
Q&A
Facing up to the cyber security challenge
James Eaton-Lee, head of information security and data protection officer at Oxfam, discusses the cyber threats and challenges facing third sector organisations tackling poverty, equality and democratic disempowerment.
-
Feature
Three things to consider when securing multi-cloud environments
Public sector organisations are all at different points on the cloud transformation and digitalisation journey.
-
Q&A
James Eaton-Lee, Head of Information Security and Data Protection Officer, Oxfam
Ahead of this week’s Data Protection World Forum webinar, Building Security’s Influence in the C Suite, PrivSec catches up with Oxfam’s James Eaton-Lee.
-
Feature
Don’t Lift and Shift: Evolve
At July’s Last Thursday in Privacy event, Sian John MBE, Microsoft’s EMEA / APJ director of cybersecurity strategy, gave companies transitioning to a cloud service model some food for thought. PrivSec’s Catherine Wycherley caught up with her to get some further insight.
-
News
A new role for the cybersecurity industry: Business Information Security Officer
Traditionally, those working in the cybersecurity industry have been technically savvy and laser-focused on tools and solutions. At a time when the whole enterprise – all its data and all its people – were safely housed in a corporate office and on the corporate network, this worked fine.
-
ebook
The Habits of Highly Data-Secure Companies
New IDG survey reveals three technologies that are helping enterprises build immunity to data breaches, in and out of the cloud.
-
Feature
The Risks of Checkbox Compliance
A key principle of the GDPR is that personal data must be processed securely, using “appropriate technical and organisational measures” – the “security principle”. To meet this principle, organisations implement a variety of IT security technologies, all aimed at protecting information where it is stored and processed.
-
Webinar
Prevent Costly Breaches in a Safe and Compliant Way
With so many communications exchanged daily, it’s not a question of whether a mistake will occur, but how often.
-
ebook
How to strengthen information security with data discovery
Today, every company is a data company. Every business, no matter which sector it claims to be in, is producing extraordinary amounts of data which is growing in size every day. We are all operating in the information age and data has become the most valuable commodity a business owns. There’s so much value locked away within it.
-
ebook
Remote Work Security: Privacy and Cybersecurity Essentials
With the onset of Coronavirus, the issue of remote working has been pushed to the forefront for organizations globally.
-
Article
Body temperature cameras fuse security with virus screening technology
Cybersecurity and visuals tech company, Platinum CCTV, has unveiled a new thermoptic cybersecurity camera designed to help screen individuals before they enter a facility, to guard against cyber threats and the spread of infectious diseases.