All IT Security Technology articles – Page 3
-
Webinar
Superior, smart and simple; how machine learning is welcoming a new era of data loss prevention
It is widely acknowledged that human error is the leading cause of data breaches. Arming your people with smart solutions to prevent security incidents should be a top priority in our new world of remote working.
-
News
Mistrust of data handling ‘threatens digitalisation of economy’
The digital world is at risk without deep reform of the way companies treat data and governments regulate it, according to Lorenzo Milans del Bosch, a partner in US management consultants Oliver Wyman.
-
ebook
Has O365 closed the door to data leaks?
Efficiency, collaboration and security are often the positive messages in regards to implementing Office365 in any organisation. But, is your organisation truly experiencing the comfort of safe communication?
-
News
Connecticut gives companies some protection from cyber security breaches
The governor of Connecticut, Ned Lamont, has signed into law legislation which protects businesses from punitive damages if personal or restricted information is improperly accessed.
-
Webinar
Private Healthcare: Why do you need intelligent email security?
Email is a vital communication tool for organisations globally. But email is the top security risk for healthcare providers as employees accidentally leak data everyday.
-
Video
Confidential Computing: The Next, Great, Development in Data Protection
A recent IBM IBV study said 74% of CEOs think adoption of cloud will be critical for their businesses in the next two to three years.
-
Video
How do we Address the Large Skills Gap Across our Organisations when it comes to Emerging Technology Risk and Security?
This is one of the key challenges facing Boards and C-Suites globally; this panel will look at the options when it comes to upskilling your teams, what is the nature of upskilling and how do you put such methods into practice.
-
Video
Managing Cybersecurity Challenges in Digital Transformation Projects
Design and technology projects can involve heavy use of IT software by a wide group of people, making them a potential target for cyberattackers.
-
Video
Women and Diversity in Cybersecurity: Why Are We Still Having this Conversation?
Recent research by Tessian found that a higher proportion of young men were likely to consider a career in cyber security than young women.
-
Video
Engaging Your Line of Business for Cybersecurity Initiatives
Security cannot be done in a silo. The extent and nature of data shared across line of business functions both internally and externally fuels instances of system and organizational vulnerabilities.
-
Video
The GRC Red Flag Series with Michael Rasmussen - GRC Orchestrate with ING
Access the on-demand video for The GRC Red Flag Series with Michael Rasmussen: GRC Ochestrate featuring ING
-
News
The work-from-home model has ‘tested CISOs like never before’
Human error considered the biggest cyber vulnerability for organisations as the hybrid workforce presents new challenges for CISOs.
-
ebook
Outbound email: Microsoft 365’s security blind spot
Why isn’t Microsoft 365 stopping more outbound email data breaches? Understand its security limitations - and learn how to protect your business.
-
ebook
Old school anonymization is out, synthetic data is in
The world is changing, and anonymous data is not anonymous anymore.
-
ebook
Safeguarding your critical data from the ransomware threat
Ransomware attacks are on the rise and targeting organizations of all sizes and industries.
-
ebook
6 Questions to ask about any BaaS
To find the right BaaS solution, you need to ask the right questions.
-
Blog
The journey to automation
Cyber security defence strategies are too often reliant on manual processes - this needs to change as we enter the age of AI, argues Jan Tietze
-
Blog
Driving cloud security from the edge for post-COVID success
Investments in cloud infrastructure have helped companies survive a potentially catastrophic period in the pandemic. Now it’s time to look at boosting security from the edge, argues David Shepherd.
-
News
97% of businesses ‘experienced cyber attacks via mobile devices last year’
Nearly every business polled reported a cyber-attack via a mobile device last year, according to research by cyber security firm Check Point Software Technologies
-
News
Israeli regtech AML firm ‘considers public listing’ ahead of expected AI boom
Israeli cyber security firm ThetaRay is considering listing on the stock market following an increase in the valuation of regtech companies.