All Security articles – Page 24
-
News
Airbnb admits to ‘technical issue’ that resulted in exposure of users’ private messages
The internal leak exposed Airbnb hosts’ personally identifiable information (PII) to other users.
-
Q&A
Facing up to the cyber security challenge
James Eaton-Lee, head of information security and data protection officer at Oxfam, discusses the cyber threats and challenges facing third sector organisations tackling poverty, equality and democratic disempowerment.
-
Feature
Preparing for the cybercrime challenge: tips from a former FBI agent
Few have witnessed the developments in cybercrime unfold over the past 20 years as closely as Jeff Lanza. The former FBI agent has followed the progression of white-collar crime since the 1980s and has seen first-hand how investigations went from being all about catching gangsters operating in the physical world, to catching online hackers in just a matter of years.
-
News
Zerologon vulnerability actively exploited, says Microsoft
Microsoft has observed attacks exploiting the serious security flaw dubbed “Zerologon”, the company’s security intelligence team reported in a tweet yesterday.
-
Feature
Three things to consider when securing multi-cloud environments
Public sector organisations are all at different points on the cloud transformation and digitalisation journey.
-
Q&A
James Eaton-Lee, Head of Information Security and Data Protection Officer, Oxfam
Ahead of this week’s Data Protection World Forum webinar, Building Security’s Influence in the C Suite, PrivSec catches up with Oxfam’s James Eaton-Lee.
-
Feature
Security: more than just “tech”
Ahead of this week’s Data Protection World Forum webinar, Building Security’s Influence in the C Suite, independent cyber security consultant Dr Emma Osborn highlights the importance of owning cyber risk at board level.
-
News
Cyber attack linked to death of woman at hacked German hospital
A woman has died in Germany after a cyber attack at the Düsseldorf University Clinic (DUC) caused her to be turned away for emergency medical treatment at the hospital earlier in September.
-
Webinar
A New and Critical Approach To Protecting Your Data
Most cybersecurity protections are based on looking for, finding, and stopping threats.
-
Feature
Don’t Lift and Shift: Evolve
At July’s Last Thursday in Privacy event, Sian John MBE, Microsoft’s EMEA / APJ director of cybersecurity strategy, gave companies transitioning to a cloud service model some food for thought. PrivSec’s Catherine Wycherley caught up with her to get some further insight.
-
News
A new role for the cybersecurity industry: Business Information Security Officer
Traditionally, those working in the cybersecurity industry have been technically savvy and laser-focused on tools and solutions. At a time when the whole enterprise – all its data and all its people – were safely housed in a corporate office and on the corporate network, this worked fine.
-
News
Hackers turn hunted in new AI-based cyber security deception tool
The University of Strathclyde has announced that researchers at its Centre for Intelligent and Dynamic Communications are working on a cyber security solution that uses AI and deception to protect network systems.
-
News
China announces global security standards initiative
China announced on Tuesday that it will launch an initiative to promote global data security in this area, Global Times reported.
-
ebook
Ransomware Protection with Pure Storage and Commvault
Ransomware attacks continue to be top of mind for business and IT leaders. And for good reason.
-
ebook
The Habits of Highly Data-Secure Companies
New IDG survey reveals three technologies that are helping enterprises build immunity to data breaches, in and out of the cloud.
-
News
Norwegian Parliament in Cyber Attack
Norway’s parliament reported a cyber attack to police on 1 September which hacked the accounts of a number of MPs and members of staff.
-
Feature
The Great Digital Disruption: Adjusting to a New Normal in Cybersecurity
COVID-19 has forced societies, governments, businesses and individuals to suddenly rethink long-held practices and processes. This includes fundamental aspects of our lives, such as how and where we work, teach, learn, live and interact.
-
Feature
The Risks of Checkbox Compliance
A key principle of the GDPR is that personal data must be processed securely, using “appropriate technical and organisational measures” – the “security principle”. To meet this principle, organisations implement a variety of IT security technologies, all aimed at protecting information where it is stored and processed.
-
Webinar
Cyber AI: Supporting Privacy-First Security & Data Compliance
Data privacy is critical in increasingly digitized business environments, where the workforce is dispersed and dynamic, and relies on collaboration platforms, smart devices, and cloud computing.
-
Webinar
Solving Your Number One Security Risk
Email has played a growing role in digital transformation during the COVID-19 pandemic, as organisations continue to support large-scale remote working. But it has also introduced risk of accidental and intentional data leakage.