All IT Security Technology articles – Page 3
-
Webinar
2022 Trend Watch: Realizing the Full Potential of SASE and Zero Trust
The events of 2021 have created a paradigm shift in cybersecurity. The steady cadence of large-scale cyber attacks have accelerated a move away from perimeter-focused security to Zero Trust. While core foundations of Zero Trust have been implemented, many tech leaders are still missing a critical piece of the puzzle for safeguarding their data.
-
News
Sunderland to become UK’s most advanced smart city
The city of Sunderland in the United Kingdom is set to benefit from next generation 5G mobile infrastructure.
-
News
Decentology secures $4.3 million to build the future of decentralized apps on the Hyperverse
A fast-growing blockchain startup has announced plans to build the Hyperverse - an open, blockchain-agnostic, decentralized, marketplace for composable smart contracts.
-
Video
Ethics and Consent: How Ethical AI Can Change The World
There is a fork in the road ahead - missue of AI and data can continue, or change can be demanded and a more ethical approach to AI and ML can be our future.
-
Video
Artificial Intelligence/Machine Learning: How Can AI lead to a New Revolution in Cybersecurity
Artificial Intelligence and Machine Learning have radically affected the ways in which we work; within cybersecurity this is fascinating, as it will affect the ways in which cybercriminals operate as much as how security teams can evolve.
-
Webinar
Superior, smart and simple; how machine learning is welcoming a new era of data loss prevention
It is widely acknowledged that human error is the leading cause of data breaches. Arming your people with smart solutions to prevent security incidents should be a top priority in our new world of remote working.
-
News
Mistrust of data handling ‘threatens digitalisation of economy’
The digital world is at risk without deep reform of the way companies treat data and governments regulate it, according to Lorenzo Milans del Bosch, a partner in US management consultants Oliver Wyman.
-
ebook
Has O365 closed the door to data leaks?
Efficiency, collaboration and security are often the positive messages in regards to implementing Office365 in any organisation. But, is your organisation truly experiencing the comfort of safe communication?
-
News
Connecticut gives companies some protection from cyber security breaches
The governor of Connecticut, Ned Lamont, has signed into law legislation which protects businesses from punitive damages if personal or restricted information is improperly accessed.
-
Webinar
Private Healthcare: Why do you need intelligent email security?
Email is a vital communication tool for organisations globally. But email is the top security risk for healthcare providers as employees accidentally leak data everyday.
-
Video
Confidential Computing: The Next, Great, Development in Data Protection
A recent IBM IBV study said 74% of CEOs think adoption of cloud will be critical for their businesses in the next two to three years.
-
Video
How do we Address the Large Skills Gap Across our Organisations when it comes to Emerging Technology Risk and Security?
This is one of the key challenges facing Boards and C-Suites globally; this panel will look at the options when it comes to upskilling your teams, what is the nature of upskilling and how do you put such methods into practice.
-
Video
Managing Cybersecurity Challenges in Digital Transformation Projects
Design and technology projects can involve heavy use of IT software by a wide group of people, making them a potential target for cyberattackers.
-
Video
Women and Diversity in Cybersecurity: Why Are We Still Having this Conversation?
Recent research by Tessian found that a higher proportion of young men were likely to consider a career in cyber security than young women.
-
Video
Engaging Your Line of Business for Cybersecurity Initiatives
Security cannot be done in a silo. The extent and nature of data shared across line of business functions both internally and externally fuels instances of system and organizational vulnerabilities.
-
Video
The GRC Red Flag Series with Michael Rasmussen - GRC Orchestrate with ING
Access the on-demand video for The GRC Red Flag Series with Michael Rasmussen: GRC Ochestrate featuring ING
-
News
The work-from-home model has ‘tested CISOs like never before’
Human error considered the biggest cyber vulnerability for organisations as the hybrid workforce presents new challenges for CISOs.
-
ebook
Outbound email: Microsoft 365’s security blind spot
Why isn’t Microsoft 365 stopping more outbound email data breaches? Understand its security limitations - and learn how to protect your business.
-
ebook
Old school anonymization is out, synthetic data is in
The world is changing, and anonymous data is not anonymous anymore.
-
ebook
Safeguarding your critical data from the ransomware threat
Ransomware attacks are on the rise and targeting organizations of all sizes and industries.