All Security articles – Page 25
-
News
Uber former security chief charged in connection with attempted data breach cover-up
The US Department of Justice has charged Joseph Sullivan, former chief security officer at Uber, with obstruction of justice following a data breach.
-
Article
4,500 successful daily cyber attacks on UK SMEs
An estimated 65,000 attacks are carried out on UK SMEs every day resulting in 4,500 breaches, a report has highlighted.
-
Webinar
Prevent Costly Breaches in a Safe and Compliant Way
With so many communications exchanged daily, it’s not a question of whether a mistake will occur, but how often.
-
ebook
How to strengthen information security with data discovery
Today, every company is a data company. Every business, no matter which sector it claims to be in, is producing extraordinary amounts of data which is growing in size every day. We are all operating in the information age and data has become the most valuable commodity a business owns. There’s so much value locked away within it.
-
ebook
Improved Ransomware Recoverability with SafeMode on FlashBlade
One of the biggest challenges in the growing digital economy is the exponential rise in ransomware attacks. Consequences can be dire: pay perpetrators to (they claim) unencrypt your data, stumble with decryption tools, or gamble on recovering from backups. With millions of dollars spent annually to guard entry points ...
-
ebook
Achieve a dependable, secure and manageable multi-cloud
In the majority of organisations, the question of whether to embrace public cloud computing was never a simple choice between that and on-premises infrastructure.
-
ebook
Phishing By Industry 2020 Benchmarking Report
As cybercrime continues to surge, security leaders must understand that there is no such thing as a perfect, fool-proof, impenetrable secure environment.
-
Video
Is Brazil Leading the way in making Data Protection a Fundamental Right?
The Brazilian General Data Protection Law (LGPD) will apply from 15 August and will cover both public and private sectors. It requires all organisations large and small to abide by the same standards and regulations. In addition, a recent Supreme Court ruling (regarding telecoms companies sharing more than 200 ...
-
ebook
Outbound email security essentials
Practically every organization requires secure method of sending emails and transferring files to customers or other contacts.
-
Video
Cyber Security: Employee Awareness in the New Normal
Phishing attacks are often seen as the most damaging and most common threat facing businesses. More people are now working from home and for many, this has the new normal – as a result employees have an increased risk of being targeted.
-
Video
Faking It - Combatting Email Impersonation with AI
Hosted by: Mariana Pereira (Director of Email Security Products, Darktrace) Video: Faking It - Combatting Email Impers…
-
Video
Avoiding the Ransomware Rampage – 5 Key Steps to Staying Secure
Hosted by: Timo Weberskirch (Sales Engineer, Quest KACE) Video: Avoiding the Ransomware Rampage – 5…
-
Video
Data Protection and Cyber Security in Flux Across the GCC
Hosted by: Nick O’Connell (Partner, Head of TMT – KSA), Vivienne Artz, (Global Chief Privacy Officer, Refinitiv), Noriswadi Ismail (Managing Director – Technology, Privacy and Cyber Risk Advisory), Ryan Rubin (Senior Managing Director, Ankura) Video: Data Protection and Cyber Security ...
-
ebook
COVID-19 Reopening Playbook: Privacy, Security, & Technology Best Practices
As more businesses move further into reopening phases, they are placing a priority on understanding what is necessary to keep employees and consumers safe – and feeling safe.
-
Video
Avoiding the Security Dangers with Work From Home (WFH)
As more and more office workers find the new normal to be work from home (WFH) there are challenges and dangers that come into play, with 90+% cyber security attacks beginning with email.
-
Webinar
Protect Ransomware’s Next Target: Backups
Ransomware attacks are accelerating at unprecedented rates, morphing their variants to evade detection, and are now successful targeting your last line of defence - backup copies.
-
Video
Creating a Global Program in an Evolving Landscape
With the ever-changing landscape of data protection, organisations have the task of ensuring their privacy program is adaptable to current and future data privacy regulations across the world.
-
Video
How to Minimise Insider Threats in Cyber Security
Insider threats, whether they are from negligence or those with malicious intent, can pose a significant risk to all organisations. Research from Ponemon Institute reveals that the average cost of insider incidents is almost double the average breach, therefore, companies face a much larger threat from workers than from outside.
-
Video
Ransomware Protection - More Than Just Backup
Hosted by: Adrian Moir (Sr. Consultant, Product Management, Quest Data Protection) Video: Ransomware Protection - More Than Just Backup
-
Feature
Security Concerns over Contact Tracing Apps
When an individual is found to be infected with the coronavirus, the race is on to find those who they have come into contact with, as these people could be carriers or even be infected. This has led to hundreds of coronavirus contact-tracing mobile applications being developed worldwide and backed by various governments and national health authorities, as well as guidelines by the EU and special protocols developed by the two major smartphone OS vendors Apple & Google. In some places, the usage of such applications has been made mandatory for people who want to gain access into public spaces.