All GLOBAL articles – Page 3
-
News
Tracking employees’ location breaches their privacy says Israel’s DPA
Employers monitoring their workers’ location significantly impairs their rights, even when it is done during working hours, according to the Privacy Protection Authority (PPA) in Israel.
-
News
T-Mobile’s beefs up cyber security after humbling experience of data breach
Telecom T-Mobile has entered into long-term partnerships with cyber security provider Mandiant and management consultancy KPMG after private information of millions of customers and prospective customers was compromised in a cyber-attack on its US operations.
-
News
Football authorities to receive $201m after corruption scandal
International soccer’s governing body Fifa and associated organisations are to receive $201m (€171m) seized by the United States’ justice department during a financial crime investigation into the way the sport was run.
-
News
T-Mobile hit with class actions after data breach
A pair of lawsuits have been filed against US telecom T-Mobile following a cyber-attack affecting more than 53m customers and prospective customers.
-
News
Ransomware attacks on rise in Australia
Reported data breaches from ransomware incidents increased by 24% to 46 in the half-year to June, compared with the previous six months, according to the Office of the Australian Information Commissioner (OAIC).
-
News
Global AML fines fallen by 50% in 1H 2021
In the first half of 2021, global fines for anti-money laundering and data privacy compliance violations fell by over 50% year on year, but could swiftly rebound as financial crime continues, according to Fenergo.
-
News
UN experts urge halt to spread of monitoring technology
A group of UN experts has repeated its call on all states to impose a global moratorium on the sale and transfer of surveillance technology until they have put in place robust regulations which guarantee it complies with international human rights standards.
-
Sponsored
The importance of data protection as a service in the post-pandemic world
Due to the COVID-19 pandemic, over the past 18 months global working habits have changed considerably. With the outbreak in the UK starting at the beginning of 2020, orders to stay at home were given across the country. As businesses rushed to implement strategies that would allow them to continue operations, cloud adoption and remote working accelerated at unprecedented rates.
-
News
Warning issued on LockBit
The Australian Cyber Security Centre (ACSC) has given out an alert about LockBit 2.0 after an increase in reports from organisations in the country impacted by the ransomware.
-
News
South African container terminal crippled by cyber-attack
Transport operator Transnet has switched to manually processing container shipments to and from Durban after a cyber-attack knocked its computer systems out of action.
-
News
Hacked Saudi Aramco data ‘for sale’
Threat actors are reportedly offering 1 TB of proprietary data stolen from the Saudi Arabian Oil Company on the darknet for a negotiable price of $5m (€4.25m).
-
News
Privacy watchdog issues warning after photos of jailed Zuma appear on social media
The Information Regulator in South Africa says it notes with concern photographs of former President Jacob Zuma taken in jail have been distributed through social media.
-
Opinion
Pegasus Spyware Investigation: What Is It, and Why Does it Matter?
Yesterday, the Guardian’s Pegasus Project revealed how governments worldwide have used—or have considered using—the Pegasus malware to spy on journalists, lawyers, activists, and other innocent people.
-
News
Client info stolen in Morgan Stanley data breach
Personal information belonging to clients of the leading investment bank Morgan Stanley have been stolen following a data breach stemming from a vulnerability in one of its third-party IT suppliers.
-
News
China plans to upgrade cyber security sector
The Ministry of Industry and Information Technology (MIIT) in China has issued a draft plan to develop the country’s cyber security industry for the next three years.
-
Webinar
Where are you on the Data Provisioning Maturity Model?
The data provisioning maturity model acts as both a measuring stick and common framework for organizations to help illustrate what is needed to understand and ultimately improve their data protection program.
-
News
Pakistan establishes AML/CTF unit
The National Accountability Bureau, Pakistan’s anti-corruption watchdog, has set up an anti-money laundering and terror financing team (AML/CTF) to check financial crimes and illegal transfer of resources.
-
Sponsored
OneTrust GRC - GRC Implementation Steps: Streamline Your IT Risk & Security Management Program
With constantly changing laws, regulations, and limited resources to stay on top of them, information security leaders often find it challenging to scale their risk and compliance programs. Having a clear understanding of “How compliant are we?” is a reoccurring question. However, scoping your compliance obligations is a foundational activity before you can start evaluating risk throughout your organization.
-
ebook
OneTrust GRC: Steering Your IT Risk Management Program
Cybersecurity in line with IT risk management is important for both your internal and external GRC execution. Forrester, a world-wide research and advisory firm, recently surveyed CEO’s to produce a new report, The Biggest Trends Shaping Enterprise Risk Management.
-
Webinar
OneTrust GRC: Building a GRC Program That Fits Your Business | A First Line Friendly ISMS Suite
How much time do you spend transferring data across systems to execute your GRC program? Oftentimes, disparate systems across policy, privacy, IT risk, vendor risk, incident, and audit result in duplicated data across applications.