All Privacy & Technology articles – Page 5
-
News
Zero trust devices growing in popularity despite industry challenges
New research finds that more organisations are turning to zero trust for device access, but adoption rates are being held back by implementation challenges.
-
Webinar
Investigating illicit trade: The importance of technology and Open Source Intelligence
Illicit trade is a popular vector for sophisticated transnational organised crime groups (OCGs) due to its relatively low risk and high reward nature. By leveraging modern technologies and exploiting the increasingly frictionless structures of globalised trade OCGs are profiting handsomely.
-
Video
Could Synthetic Data Solve Your Privacy Problems?
PrivSec Global will explore the possibilities of using synthetic data to ensure privacy, security and fairness in data processing.
-
Video
The Role of Ethics in Technology: Why ALL Companies Need to Explore This?
PrivSec Global will explore the ethics of tech and consider how companies of all sizes can navigate these important ethical questions.
-
Video
Privacy-Enhancing Technologies: Ignoring the Hype, Leveraging the Tech, Receiving the Benefits
PrivSec Global will take an in-depth look at PETs and consider how your business could benefit from these innovative technologies.
-
Video
Non Fungible Tokens: Innovation vs Privacy and Security
This panel will provide an overview of how NFTs work, and will then delve deeper into the privacy and security issues around them.
-
Video
Modernize via Migration: Best Practices and Key Benefits of Moving to the Cloud
PrivSec Global will consider the best practices for cloud migration and explain how you can get the most out of using cloud infrastructure while remaining secure and compliant.
-
Webinar
Confident Breach Readiness: Why Log4j Highlights the Urgency of Data Encryption
As evidenced by the Log4j vulnerability, cyber attacks and data breaches are escalating in frequency, scope, and sophistication. Cyber attacks have now become a guarantee, especially for large organizations. How can enterprise technology leaders remain confident in their security posture when networks and systems are at risk of being compromised?
-
Webinar
The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like
Watch this session, The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like with OneTrust’s GRC Offering Lead. Gain insight on why more companies are naming chief trust officers, creating formalized trust initiatives, and measuring trust as a metric for themselves and their business partners.
-
News
Israel to house Middle East region’s new hyperscale data centre
Israel has been chosen as the location of the development of new hyperscale data centre in the Middle East global region.
-
News
Cyber police in Ukraine commit to better health data protection
A new deal has signalled Ukraine’s increasing commitment to improving the protection standards surrounding health data in the eastern European nation.
-
News
US and UK Governments Announce Privacy-Enhancing Tech Prize
The US and the UK are partnering on “bilateral prize challenges” to encourage the development of privacy-enhancing technologies (PETs).
-
News
UK Data Regulator Faces Possible Court Challenge Over Age Verification
A coalition of children’s charities has written to the UK’s data protection regulator, the Information Commissioner’s Office (ICO), demanding the mandating of age-checking processes on pornography websites.
-
Webinar
Embracing today’s privacy landscape and leaning into privacy management
We are sharing data more than ever before and while it has simplified day-to-day business, it has also increased considerations for organizations across the globe. Countries are passing regulations with comprehensive privacy requirements and within the next two years, 53% of countries will have GDPR-like regulations.
-
Video
Lessons learnt from the Pandemic - How do we Enhance our Business Continuity Programmes in 2022?
This session looks at what businesses can do to enhance their business continuity programmes post lockdown and what they can put in place to mitigate any future risk.
-
News
Experts call for greater efforts to tackle the challenges of digital transformation
World experts in digital processing and the socio-economic impact of technological change have called for concrete action to ensure the protection and promotion of people’s rights.
-
Webinar
Why your law firm needs to layer your email security in Microsoft 365 for maximum protection
Risks to your law firms’ email security have never been greater. With remote work still as popular as ever and an explosion in digital transformation projects, there is an increase in the risks of outbound data loss. In fact, we know that 85% of law firms using Microsoft 365 had an email data breach in the last 12 months.
-
News
Epidemiology inspires AI solution to combat cyber-attacks
A leading telecommunications group in Britain is taking inspiration from the spread of viruses among humans in order to create new AI systems to fight bugs online.
-
News
More businesses plotting easier paths to IoT adoption
The majority of global IoT (Internet of Things) adopters agree that prioritising commercial, off-the-peg solutions and packaged connectivity offer the most sensible way forwards through digital transformation.
-
News
Illinois college gives notice of data privacy event
While no evidence yet exists that a misuse of personal data has occurred, Black Hawk College in Illinois, US, has announced notice of a data-related incident that may breach data privacy standards.