All articles by GRC World Forums – Page 56
-
News
Business Update: MSPAlliance Updates MSP/Cloud Verify Standard to Address Cybersecurity and MSP Assurance
MSP Verify “gold standard” updated to reflect closer alignment to CMMC (NIST 800-171) and ISO 27001 controls (Press Update)
-
Webinar
The Conversation Continues: Where International Data Transfers Stand
You may sometimes get the feeling no progress is being made to solve the issue of transferring personal data from the European Union to other countries around the world. After the draft EDPB Recommendations and draft model Standard Contractual Clauses, no major changes have been communicated.
-
News
Business Update: F-Secure launches modular platform designed for servitization of cyber security
F-Secure Elements is the first cloud-based platform created to empower organizations with fast, flexible, and easy access to cyber security services (Press Release)
-
News
Business Update: Qualys Introduces CyberSecurity Asset Management
New asset inventory app helps security teams identify and respond to gaps in their security and compliance program (Press Release)
-
Promoted
On-Demand: Beyond the Perimeter
For decades, technology leaders have focused on building a strong perimeter around their networks. But that approach to cybersecurity is no longer sustainable or effective: Globally distributed teams and supply chains have dramatically changed the way organizations create, store, and share data.
-
News
Ardagh hit by cyber-attack
Supply chain operations and product delivery at Ardagh have been impacted by what the global packaging giant described as a cyber security incident.
-
Report
Privacy & Security in the Middle East and North Africa (MENA) Region
The privacy and security laws of the Middle East and North Africa (MENA) region have developed significantly over the past two decades, as governments increasingly recognise the importance of adequate data protection in attracting trade and investment.
-
News
Business Update: Cyber Fusion Distribution Partners with XM Cyber
Attack Path Management Leader Commits to a 100% Channel-Focused Strategy to Maximize Opportunities in the United Kingdom (Press Release)
-
News
Business Update: BlackBerry Builds Out Extended Detection and Response (XDR) Capabilities
Company launches next-gen BlackBerry® Optics 3.0 and BlackBerry® Gateway for ZTNA (Press Release)
-
News
Business Update: SafeGuard Cyber Launches Illuminate Partner Program
Illuminate Partners Can Now Sell SafeGuard Cyber’s Digital Risk Protection Platform and Create Services that Protect Third-Party Social Media, Collaboration, and Mobile Chat Apps (Press Release)
-
News
Business Update: Exterro Collaborates with Microsoft on Forensics Platform
Forensic Toolkit (FTK®) Lab running on Microsoft Azure provides faster data insights and enhanced collaboration that accelerate trusted results for digital crime investigations (Press Release)
-
News
Business Update: AUTOCRYPT partners with SHIELD Automotive Cybersecurity Centre of Excellence
As automotive technology evolves to become more autonomous and electrified, threats to the technology have seen exponential increase (Press Release)
-
News
Business Update: Arqit announces BT contract and plan to create 2000 jobs
The launch positions the British economy at the forefront of global innovation in quantum, space and cyber technology (Press Release)
-
News
Business Update: Vulcan Cyber Research Reveals Most Enterprise Cyber Security Teams Lack the Ability to Remediate Risk
Benchmark study finds most cyber security organizations lack the tooling and resources to deliver enterprise cyber hygiene (Press Release)
-
News
Business Update: CEOs and CISOs Doubling Down on Cybersecurity According to WSJ Intelligence and Forcepoint Survey
90% adopting or considering SASE, 74% reallocated funds to cybersecurity among multiple indicators of cybersecurity’s impact on innovation, transformation and integration (Press Release)
-
ebook
Maintaining Continuous Visibility of Personal Data Across the Enterprise
Data volumes are growing exponentially. New data types, formats, and repositories are being created all the time. Data is being shared in the cloud and around the globe in millions of digital channels.
-
ebook
A Blueprint for Data-Centric Security
Network and device protection continue to consume IT security resources, but they are becoming less and less effective at protecting organizations from cyber threats. Data breaches are now a daily occurrence, creating massive financial burdens for corporations, government agencies, and consumers.
-
ebook
Outbound email: Microsoft 365’s security blind spot
Why isn’t Microsoft 365 stopping more outbound email data breaches? Understand its security limitations - and learn how to protect your business.
-
Webinar
So many assessments, so little time: How to prioritise when everything’s on fire
Risks are ever-changing, and often move faster than a privacy teams’ agenda can keep up with. That means you’ll have to make hard decisions about what actually gets done, whether you’re conscious of it or not.
-
News
Ecuador’s data protection bill passes key stage
Members of Ecuador’s National Assembly have approved the proposed data protection law at a second reading.