All IT Security Technology articles – Page 4
-
Video
The Financial Services Guide to Reducing Data Security Risks
Real-time sales and marketing activities benefit from holistic views of customer activity, but this comes with the heightened risk of sharing sensitive financial and personal information both within and outside of the organization.
-
News
McAfee sells enterprise arm for $4bn to focus on consumer business
Anti-virus software producer McAfee has agreed to sell its enterprise business to a consortium led by private equity firm, the Symphony Technology Group (STG), for $4.0bn (€3.33bn).
-
Analysis
The Internet of Things: strategic principles and best practice
The rise of the Internet of Things (IoT) presents new security challenges and risks. Ahead of his appearance at PrivSec Global, Arun DeSouza answers questions on how to ensure your IoT strategies are up to date and effective.
-
ebook
The Key Pillars for Protecting Sensitive Data
Traditionally organizations have focused IT security primarily on perimeter defense, building walls to block external threats from entering the network. While this is still important, it is not enough.
-
News
Jamaica launches criminal investigation into weakness of Covid-19 app
The Jamaican government has begun a criminal investigation after a security vulnerability was discovered associated with the JamCovid-19 app which people travelling to the country have to use to gain authorisation to enter.
-
Analysis
PrivSec fundraising deals in January and February 2021
A round-up of some of the latest fundraising and business deals in the cyber security , data protection and privacy sectors
-
Blog
Bridging the gap between business goals and security requirements
Involving as many people as possible in the security process strengthens practices, thereby closing the gap between business users and security teams, argues Alex Armson
-
News
FTC settles with travel insurer for lax security on cloud database
The Federal Trade Commission (FTC) in the US has finalised a settlement with SkyMed International over allegations that the emergency travel services provider failed to take reasonable steps to secure sensitive consumer information.
-
ebook
A Practical Guide on How to Protect Your Organization’s Sensitive Data
IT Security teams are looking for a holistic approach to solving today’s data security challenges, with a data security platform that enables them to identify and protect sensitive data wherever it resides, using a comprehensive set of data protection mechanisms and centralized policy and key management.
-
News
4,000 files feared stolen in cyber attack on Scottish regulator
An environmental regulator in Scotland has confirmed that at least 4,000 files have been accessed and likely stolen by criminals in an ongoing cyberattack on its systems.
-
Report
Nine cybersecurity trends to watch out for in 2021
PrivSec Report identifies nine major themes we expect to be talking points in the new year in the world of cybersecurity
-
Sponsored
Data locality is a compliance control, not a security control
Data locality is increasingly seen as important, but is there confusion as to why it matters? Microsoft’s Mark Anderson explains what he believes to be the real reason for its importance
-
News
UAE suffers “250% increase” in cyber attacks this year
Cyber attacks have risen sharply this year, according to Mohamed Al-Kuwaiti, Executive Director of the UAE’s National Electronic Security Authority, CNBC reported.
-
Video
The Deployment of AI, ML and Emerging Technologies in Cyber Defence and Attack
The deployment of new and cutting-edge technologies like Machine Learning and Artificial Intelligence can help security specialists to analyse and correlate data to identify patterns, scan various risks, gain predictive insights and forecast potential breaches.
-
Video
Data Protection and Security in the Cloud
As the cloud environment continues to develop and new mechanisms are introduced which affect organisations’ strategies, opportunities and risks grow in complexity.
-
Video
Disposing of Data Securely & Completely in a Post-Covid World
Drawing on industry research, best practices and case studies, we’ll explore why enterprises must address end-of-life data more efficiently and precisely than ever before.
-
Video
Embedding Security and Risk Management into Your Organisation
Cyber security plays a critical role in helping digital businesses to flourish.
-
Video
Best Practice for Incident Response
Effective incident response is a key component of being able to contain and respond to a breach.
-
Video
How Diversity Can Enable Organisations to Combat Security Risks
A diverse cybersecurity team is critical to generating ideas and processes needed to confront security risks.
-
News
Trump fires CISA Director over statement on US election security
The Director of the Cybersecurity and Infrastructure Security Agency (CISA) was fired by Donald Trump yesterday because he authorised a statement saying that the election was “the most secure in American history.”