All Security articles – Page 13
-
News
Hacked Saudi Aramco data ‘for sale’
Threat actors are reportedly offering 1 TB of proprietary data stolen from the Saudi Arabian Oil Company on the darknet for a negotiable price of $5m (€4.25m).
-
ebook
Has O365 closed the door to data leaks?
Efficiency, collaboration and security are often the positive messages in regards to implementing Office365 in any organisation. But, is your organisation truly experiencing the comfort of safe communication?
-
News
Tests validate accuracy of face recognition software’s for boarding flights
The National Institute of Standards and Technology (NIST) in the US has found facial recognition algorithms can identify a passenger’s face with at least 99.5% accuracy using a single scan.
-
News
Data protection vital for US competitiveness, says security chief
Data security and privacy are at the heart of the United States’ competitiveness, according to national security advisor Jake Sullivan.
-
News
Cameras in changing areas ‘step too far’ says Swedish DPA
Permanent video monitoring of spaces in eastern Skaraborg’s fire stations where crew members change clothes when responding to an emergency overstepped the mark, Sweden’s privacy protection authority (IMY) has ruled.
-
News
ByteDance ‘calls off IPO’ amid data concerns
Chinese owner of video app TikTok, ByteDance, is said to have indefinitely put on hold intentions to make an initial public offering (IPO) of shares offshore after government officials told the company to focus on addressing data security risks.
-
News
China plans to upgrade cyber security sector
The Ministry of Industry and Information Technology (MIIT) in China has issued a draft plan to develop the country’s cyber security industry for the next three years.
-
News
UK to revamp technology governance
The British government has launched a public consultation on its Plan for Digital Regulation which sets out a new approach to governing technology in the country.
-
Sponsored
OneTrust GRC - GRC Implementation Steps: Streamline Your IT Risk & Security Management Program
With constantly changing laws, regulations, and limited resources to stay on top of them, information security leaders often find it challenging to scale their risk and compliance programs. Having a clear understanding of “How compliant are we?” is a reoccurring question. However, scoping your compliance obligations is a foundational activity before you can start evaluating risk throughout your organization.
-
ebook
OneTrust GRC: Steering Your IT Risk Management Program
Cybersecurity in line with IT risk management is important for both your internal and external GRC execution. Forrester, a world-wide research and advisory firm, recently surveyed CEO’s to produce a new report, The Biggest Trends Shaping Enterprise Risk Management.
-
Sponsored
OneTrust GRC: Are You Ready for Risk Quantification?
Are you ready for risk quantification? Follow this decision tree to understand if you’re ready for risk quantification today – or if not, what actions can you take to enhance insights today that will support risk quantification in the future!
-
Sponsored
4 Ways to Strengthen Cybersecurity for a Hybrid Workforce
Workplace tech used to be a lot more uniform: When you walked into an office, you likely saw an all-desktop-PC environment with a fairly consistent suite of software and tools, all used within the confines of a single network.
-
Video
A Fireside Chat with Johnny Ryan
Johnny Ryan, Author, Senior Fellow at Irish Council for Civil Liberties, and Open Markets Institute. Self proclaimed sufferer of “adtech remorse”.
-
Video
How do we Address the Large Skills Gap Across our Organisations when it comes to Emerging Technology Risk and Security?
This is one of the key challenges facing Boards and C-Suites globally; this panel will look at the options when it comes to upskilling your teams, what is the nature of upskilling and how do you put such methods into practice.
-
Video
Building Security Teams panel: The Increasing Importance of DEI in the Recruiting Process
There has been much written about recruitment issues in cybersecurity, whether it be a cyber skills gap or retirees taking their expertise with them.
-
Video
Phishing, Ransomware Prevention Plans and Staying One Step Ahead of Cybercriminals
According to the FBI, phishing was the most common type of cybercrime in 2020 and nearly doubled in frequency to 241,324 incidents last year. But why are criminals increasingly looking to phishing to carry out attacks.
-
Video
Data Breaches: It Does Happen All The Time and It Is a Big Deal
Incidents and data breaches are increasing year-on-year.
-
Video
Navigating Data Security in the Cloud
An overwhelming number of businesses today are choosing the cloud to host software applications, govern IT workloads, and assist with facilitating rapid technology innovation. Unfortunately, along with the cloud comes ambiguity regarding data security responsibilities.
-
Video
Managing Cybersecurity Challenges in Digital Transformation Projects
Design and technology projects can involve heavy use of IT software by a wide group of people, making them a potential target for cyberattackers.
-
Video
Third Party Risk Management: Cybersecurity Expertise into Board Governance and a Company’s Digital Defense
As companies the world over grapple with the rising cyber security threat, is it now time to have a director in charge of cybersecurity in the boardroom? If so, how do you ensure you find the right person.